-
2
-
-
0006100649
-
Smashing the stack for fun and profit
-
Aleph One: Smashing the stack for fun and profit. Phrack 7 (1996)
-
(1996)
Phrack
, vol.7
-
-
Aleph, O.1
-
3
-
-
1642387377
-
Consh: A confined execution environment for Internet computations
-
Alexandrov, A., Kmiec, P., Schauser, K.: Consh: A confined execution environment for Internet computations (1998)
-
(1998)
-
-
Alexandrov, A.1
Kmiec, P.2
Schauser, K.3
-
4
-
-
12844286929
-
The Shellcode generation
-
Arce, I.: The Shellcode generation. IEEE Secur. Priv. 2, 72-76 (2004)
-
(2004)
IEEE Secur. Priv.
, vol.2
, pp. 72-76
-
-
Arce, I.1
-
5
-
-
85081770459
-
The Internet motion sensor: A distributed blackhole monitoring system
-
Bailey, M., Cooke, E., Jahanian, F., Nazario, J., Watson, D.: The Internet motion sensor: A distributed blackhole monitoring system. In: Proceedings of the ISOC Symposium on Network and Distributed Systems Security (SNDSS), pp. 167-179 (2005)
-
(2005)
Proceedings of the ISOC Symposium on Network and Distributed Systems Security (SNDSS)
, pp. 167-179
-
-
Bailey, M.1
Cooke, E.2
Jahanian, F.3
Nazario, J.4
Watson, D.5
-
10
-
-
17644393012
-
Bypassing StackGuard and StackShield
-
Bulba, K.: Bypassing StackGuard and StackShield. Phrack 5 (2000)
-
(2000)
Phrack
, vol.5
-
-
Bulba, K.1
-
12
-
-
0035703918
-
Recursive restartability: Turning the reboot sledgehammer into a scalpel
-
Schloss Elmau, Germany, IEEE Computer Society
-
Candea, G., Fox, A.: Recursive restartability: Turning the reboot sledgehammer into a scalpel. In: Proceedings of the 8th Workshop on Hot Topics in Operating Systems (HotOS-VIII), pp. 110-115 Schloss Elmau, Germany, IEEE Computer Society, (2001)
-
(2001)
Proceedings of the 8th Workshop on Hot Topics in Operating Systems (HotOS-VIII)
, pp. 110-115
-
-
Candea, G.1
Fox, A.2
-
13
-
-
33646015199
-
-
CERT Advisory CA-2001-19: 'Code Red' Worm Exploiting Buffer Overflow in IIS Indexing Service DLL
-
CERT Advisory CA-2001-19: 'Code Red' Worm Exploiting Buffer Overflow in IIS Indexing Service DLL. http://www.cert.org/advisories/CA-2001-19.html (2001)
-
(2001)
-
-
-
14
-
-
33646014870
-
-
Cert Advisory CA-2003-04: MS-SQL Server Worm
-
Cert Advisory CA-2003-04: MS-SQL Server Worm. http://www.cert.org/ advisories/CA-2003-04.html (2003)
-
(2003)
-
-
-
15
-
-
25644452721
-
Model checking one million lines of C code
-
Chen, H., Dean, D., Wagner, D.: Model checking one million lines of C code. In: Proceedings of the Network and Distributed System Security (NDSS) Symposium, pp. 171-185 (2004)
-
(2004)
Proceedings of the Network and Distributed System Security (NDSS) Symposium
, pp. 171-185
-
-
Chen, H.1
Dean, D.2
Wagner, D.3
-
17
-
-
10944267118
-
Static analysis for security
-
Chess, B., McGraw, G.: Static analysis for security. IEEE Secur. Priv. 2, 76-79 (2004)
-
(2004)
IEEE Secur. Priv.
, vol.2
, pp. 76-79
-
-
Chess, B.1
McGraw, G.2
-
19
-
-
0023294949
-
Computer viruses: Theory and practice
-
Cohen, F.: CTmputer viruses: theory and practice. Comput. Secur. 6, 22-35 (1987)
-
(1987)
Comput. Secur.
, vol.6
, pp. 22-35
-
-
Cohen, F.1
-
20
-
-
84885679117
-
Vigilante: End-to-end containment of Internet worms
-
ACM, New York
-
Costa, M., Crowcroft, J., Castro, M., Rowstron, A., Zhou, L., Zhang, L., BarhaN, P.: Vigilante:end-to-end containment of Internet worms. In: SOSP '05: Proceedings of the Twentieth ACM symposium on Operating systems principles, vol. 39, pp. 133-147. ACM, New York (2005)
-
(2005)
SOSP '05: Proceedings of the Twentieth ACM Symposium on Operating Systems Principles
, vol.39
, pp. 133-147
-
-
Costa, M.1
Crowcroft, J.2
Castro, M.3
Rowstron, A.4
Zhou, L.5
Zhang, L.6
Barham, P.7
-
21
-
-
1542697134
-
SubDomain: Parsimonious security for server appliances
-
Cowan, C., Beattie, S., Pu, C., Wagle, P., Gligor, V.: SubDomain: parsimonious security for server appliances. In: Proceedings of the 14th USENIX System Administration Conference (LISA 2000) (2000)
-
(2000)
Proceedings of the 14th USENIX System Administration Conference (LISA 2000)
-
-
Cowan, C.1
Beattie, S.2
Pu, C.3
Wagle, P.4
Gligor, V.5
-
22
-
-
85084160243
-
StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks
-
Cowan, C., Pu, C., Maier, D., Hinton, H., Walpole, J., Bakke, P., BeattiA, S., Grier, A., Wagle, P., Zhang, Q.: StackGuard: automatic adaptive detection and prevention of buffer-overflow attacks. In: Proceedings of the 7th USENIX Security Symposium (1998)
-
(1998)
Proceedings of the 7th USENIX Security Symposium
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Hinton, H.4
Walpole, J.5
Bakke, P.6
Beattie, S.7
Grier, A.8
Wagle, P.9
Zhang, Q.10
-
23
-
-
35048879637
-
HoneyStat: Local worm detection using Honepots
-
Dagon, D., Qin, X., Gu, G., Lee, W., Grizzard, J., Levine, J., Owen, H.: HoneyStat: Local worm detection using Honepots. In: Proceedings of the 7th International Symposium on Recent Advances in Intrusion Detection (RAID), pp. 39-58 (2004)
-
(2004)
Proceedings of the 7th International Symposium on Recent Advances in Intrusion Detection (RAID)
, pp. 39-58
-
-
Dagon, D.1
Qin, X.2
Gu, G.3
Lee, W.4
Grizzard, J.5
Levine, J.6
Owen, H.7
-
24
-
-
1442288535
-
Automatic detection and repair of errors in data structures
-
Demsky, B., Rinard, M.C.: Automatic detection and repair of errors in data structures. In: Proceedings of the 18th Annual ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Application (OOPSLA) (2003)
-
(2003)
Proceedings of the 18th Annual ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Application (OOPSLA)
-
-
Demsky, B.1
Rinard, M.C.2
-
25
-
-
1442288535
-
Automatic detection and repair of errors in data structures
-
Demsky, B., Rinard, M.C.: Automatic detection and repair of errors in data structures. In: Proceedings of the 18th Annual ACM SIGPLAN Conference on Object Oriented Programming, Systems, Languages, and Applications (2003)
-
(2003)
Proceedings of the 18th Annual ACM SIGPLAN Conference on Object Oriented Programming, Systems, Languages, and Applications
-
-
Demsky, B.1
Rinard, M.C.2
-
27
-
-
21644474151
-
RacerX: Effective, static detection of race conditions and deadlocks
-
Engler, D., Ashcraft, K.: RacerX: Effective, static detection of race conditions and deadlocks. In: Proceedings of ACM SOSP (2003)
-
(2003)
Proceedings of ACM SOSP
-
-
Engler, D.1
Ashcraft, K.2
-
28
-
-
18744376132
-
GCC extension for protecting applications from stack-smashing attacks
-
Etoh, J.: GCC extension for protecting applications from stack-smashing attacks. http://www.trl.ibm.com/projects/security/ssp/ (2000)
-
(2000)
-
-
Etoh, J.1
-
30
-
-
84940106242
-
Hardening COTS software with generic software wrappers
-
Oakland, CA
-
Fraser, T., Badger, L., Feldman, M.: Hardening COTS software with generic software wrappers. In: Proceedings of the IEEE Symposium on Security and Privacy. Oakland, CA (1999)
-
(1999)
Proceedings of the IEEE Symposium on Security and Privacy
-
-
Fraser, T.1
Badger, L.2
Feldman, M.3
-
31
-
-
7244258833
-
New chips stop buffer overflow attacks
-
Garber, L.: New chips stop buffer overflow attacks. IEEE Comput. 37, 28 (2004)
-
(2004)
IEEE Comput.
, vol.37
, pp. 28
-
-
Garber, L.1
-
32
-
-
85180406262
-
Ostia: A delegating architecture for secure system call interposition
-
Garfinkel, T., Pfaff, B., Rosenblum, M.: Ostia: A delegating architecture for secure system call interposition. In: Proceedings of the Network and Distributed System Security (NDSS) Symposium, pp. 187-201 (2004)
-
(2004)
Proceedings of the Network and Distributed System Security (NDSS) Symposium
, pp. 187-201
-
-
Garfinkel, T.1
Pfaff, B.2
Rosenblum, M.3
-
34
-
-
0003246945
-
SLIC: An extensibility system for commodity operating systems
-
Ahormley, D.P., Petrou, D., Rodrigues, S.H., Anderson, T.E.: SLIC: an extensibility system for commodity operating systems. In: Proceedings of the 1998 USENIX Annual Technical Conference, pp. 39-52 (1998)
-
(1998)
Proceedings of the 1998 USENIX Annual Technical Conference
, pp. 39-52
-
-
Ghormley, D.P.1
Petrou, D.2
Rodrigues, S.H.3
Anderson, T.E.4
-
35
-
-
85084162735
-
A secure environment for untrusted helper applications
-
Goldberg, I., Wagner, D., Thomas, R., Brewer, E.A.: A secure environment for untrusted helper applications. In: Procedings of the 1996 USENIX Annual Technical Conference (1996)
-
(1996)
Procedings of the 1996 USENIX Annual Technical Conference
-
-
Goldberg, I.1
Wagner, D.2
Thomas, R.3
Brewer, E.A.4
-
37
-
-
35048866324
-
Symantec deception server experience with a commercial deception system
-
Hernacki, B., Bennett, J., Lofgren, T.: Symantec deception server experience with a commercial deception system. In: Proceedings of the 7th International Symposiun on Recent Advanced in Intrusion Detection (RAID), pp. 188-202 (2004)
-
(2004)
Proceedings of the 7th International Symposiun on Recent Advanced in Intrusion Detection (RAID)
, pp. 188-202
-
-
Hernacki, B.1
Bennett, J.2
Lofgren, T.3
-
38
-
-
33645977900
-
Sub-operating systems: A new approach to application security
-
Ioannidis, S., BeAlovin, S., Smith, J.M.: Sub-operating systems: a new approach to application security. In: Proceedings 10th SIGOPS European Workshop, pp. 108-115 (2002)
-
(2002)
Proceedings 10th SIGOPS European Workshop
, pp. 108-115
-
-
Ioannidis, S.1
Bellovin, S.2
Smith, J.M.3
-
40
-
-
0036783479
-
Source transformation in software engineering using the TXL transformation system
-
Cordy, J.R., Dean, T.R., Schneider, K.: Source transformation in software engineering using the TXL transformation system. J. Inf. Software Technol. 44, 827-837 (2002)
-
(2002)
J. Inf. Software Technol
, vol.44
, pp. 827-837
-
-
Cordy, J.R.1
Dean, T.R.2
Schneider, K.3
-
45
-
-
85084162336
-
Secure execution via program shepherding
-
Kiriansky, V., Bruening, D., Amarasinghe, S.: Secure execution via program shepherding. In: Proceedings of the 11th USENIX Security Symposium, pp. 191-205 (2002)
-
(2002)
Proceedings of the 11th USENIX Security Symposium
, pp. 191-205
-
-
Kiriansky, V.1
Bruening, D.2
Amarasinghe, S.3
-
48
-
-
3042781457
-
Crossover: Online pests plaguing the offline world
-
Levy, E.: Crossover: Online pests plaguing the offline world. IEEE Secur. Priv. 1, 71-73 (2003)
-
(2003)
IEEE Secur. Priv.
, vol.1
, pp. 71-73
-
-
Levy, E.1
-
51
-
-
0042536223
-
Welcome To My Tarpit: The Tactical and Strategic Use of LaBrea
-
Liston, T.: Welcome To My Tarpit: The Tactical and Strategic Use of LaBrea. http://www.threenorth.com/LaBrea/LaBrea.txt (2001)
-
(2001)
-
-
Liston, T.1
-
53
-
-
31844441738
-
On the effectiveness of automatic patching
-
WORM '05
-
Vojnovic, M., Ganesh, A.: On the effectiveness of automatic patching. In: WORM '05 (2005)
-
(2005)
-
-
Vojnovic, M.1
Ganesh, A.2
-
55
-
-
0141762461
-
Code-Red: A case study on the spread and victims of an Internet worm
-
MoorA, D., Shanning, C., Claffy, K.: Code-Red: a case study on the spread and victims of an Internet worm. In: Proceedings of the 2nd Internet Measurement Workshop (IMW), pp. 273-284 (2002)
-
(2002)
Proceedings of the 2nd Internet Measurement Workshop (IMW)
, pp. 273-284
-
-
Moore, D.1
Shanning, C.2
Claffy, K.3
-
56
-
-
0042474173
-
Internet quarantine: Requirements for containing self-propagating code
-
Moore, D., Shannon, C., Voelker, G., Savage, S.: Internet quarantine: requirements for containing self-propagating code. In: Proceedings of the IEEE Infocom Conference (2003)
-
(2003)
Proceedings of the IEEE Infocom Conference
-
-
Moore, D.1
Shannon, C.2
Voelker, G.3
Savage, S.4
-
58
-
-
79953672829
-
Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
-
Newsome, J., Song, D.: Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In: The 12th Annual Network and Distributed System Security Symposium (2005)
-
(2005)
The 12th Annual Network and Distributed System Security Symposium
-
-
Newsome, J.1
Song, D.2
-
60
-
-
4544239482
-
Buttercup: On network-based detection of polymorphic buffer overflow vulnerabilities
-
Pasupulati, A., Coit, J., Levitt, K., Wu, S., Li, S., Kuo, J., Fan, K.: Buttercup: On network-based detection of polymorphic buffer overflow vulnerabilities. In: Proceedings of the Network Operations and Management Symposium (NOMS), vol. 1, pp. 235-248 (2004)
-
(2004)
Proceedings of the Network Operations and Management Symposium (NOMS)
, vol.1
, pp. 235-248
-
-
Pasupulati, A.1
Coit, J.2
Levitt, K.3
Wu, S.4
Li, S.5
Kuo, J.6
Fan, K.7
-
61
-
-
85084160542
-
A flexible containment mechanism for executing untrusted code
-
Peterson, D.S., Bishop, M., Pandey, R.: A flexible containment mechanism for executing untrusted code. In: Proceedings of the 11th USENIX Security Symposium, pp. 207-225 (2002)
-
(2002)
Proceedings of the 11th USENIX Security Symposium
, pp. 207-225
-
-
Peterson, D.S.1
Bishop, M.2
Pandey, R.3
-
62
-
-
4344593013
-
Beyond stack smashing: Recent advances in exploiting buffer overflows
-
Pincus, J., BakerR B.: Beyond stack smashing: recent advances in exploiting buffer overflows. IEEE Secur. Priv. 2, 20-27 (2004)
-
(2004)
IEEE Secur. Priv.
, vol.2
, pp. 20-27
-
-
Pincus, J.1
Baker, B.2
-
64
-
-
85048404745
-
Preventing privilege escalation
-
Provos, N., Friedl, M., Honeyman, P.: Preventing privilege escalation. In: Proceedings of the 12th USENIX Security Symposium, pp. 231-242 (2003)
-
(2003)
Proceedings of the 12th USENIX Security Symposium
, pp. 231-242
-
-
Provos, N.1
Friedl, M.2
Honeyman, P.3
-
67
-
-
2642547913
-
On-line intrusion detection and attack prevention using diversity, generate-and-test, and generalization
-
Reynolds, J.C., Just, J., Clough, L., Maglich, R.: On-line intrusion detection and attack prevention using diversity, generate-and-test, and generalization. In: Proceedings of the 36th Annual Hawaii International Conference on System Sciences (HICSS) (2003)
-
(2003)
Proceedings of the 36th Annual Hawaii International Conference on System Sciences (HICSS)
-
-
Reynolds, J.C.1
Just, J.2
Clough, L.3
Maglich, R.4
-
68
-
-
84906487819
-
Enhancing server availability and security through failure-oblivious computing
-
Rinard, M., Cadar, C., Dumitran, D., Roy, D., Leu, T., Beebee, J.: Enhancing server availability and security through failure-oblivious computing. In: Proceedings 6th Symposium on Operating Systems Design and Implementation (OSDI) (2004)
-
(2004)
Proceedings 6th Symposium on Operating Systems Design and Implementation (OSDI)
-
-
Rinard, M.1
Cadar, C.2
Dumitran, D.3
Roy, D.4
Leu, T.5
Beebee, J.6
-
69
-
-
21644473822
-
A dynamic technique for eliminating buffer overflow vulnerabilities (and other memory errors)
-
Rinard, M., Cadar, C., Dumitran, D., Roy, D., Leu, T.: A dynamic technique for eliminating buffer overflow vulnerabilities (and other memory errors). In: Proceedings 20th Annual Computer Security Applications Conference (ACSAC) (2004)
-
(2004)
Proceedings 20th Annual Computer Security Applications Conference (ACSAC)
-
-
Rinard, M.1
Cadar, C.2
Dumitran, D.3
Roy, D.4
Leu, T.5
-
73
-
-
21644444136
-
Model-carrying code: A practical approach for safe execution of untrusted applications
-
Sekar, R., Venkatakrishnan, V.N., Basu, S., Bhatkar, S., DuVarney, D.C.: Model-carrying code: A practical approach for safe execution of untrusted applications. In: Proceedings of ACM SOSP (2003)
-
(2003)
Proceedings of ACM SOSP
-
-
Sekar, R.1
Venkatakrishnan, V.N.2
Basu, S.3
Bhatkar, S.4
DuVarney, D.C.5
-
74
-
-
85084164620
-
Detecting format string vulnerabilities with type qualifiers
-
Shankar, U., Talwar, K., Foster, J.S., Wagner, D.: Detecting format string vulnerabilities with type qualifiers. In: Proceedings of the 10th USENIX Security Symposium, pp. 201-216 (2001)
-
(2001)
Proceedings of the 10th USENIX Security Symposium
, pp. 201-216
-
-
Shankar, U.1
Talwar, K.2
Foster, J.S.3
Wagner, D.4
-
75
-
-
4344627335
-
The spread of the Witty worm
-
Shannon, C., Moore, D.: The spread of the Witty worm. IEEE Secur. Priv. 2, 46-50 (2004)
-
(2004)
IEEE Secur. Priv.
, vol.2
, pp. 46-50
-
-
Shannon, C.1
Moore, D.2
-
77
-
-
30344459996
-
Countering network worms through automatic patch generation
-
(to appear)
-
Sidiroglou, S., Keromytis, A.D.: Countering network worms through automatic patch generation. IEEE Secur. Priv. (2005) (to appear).
-
(2005)
IEEE Secur. Priv.
-
-
Sidiroglou, S.1
Keromytis, A.D.2
-
79
-
-
0041534274
-
A Snapshot of Global Internet Worm Activity
-
Technical report, Arbor Networks
-
Song, D., Malan, R., Stone, R.: A Snapshot of Global Internet Worm Activity. Technical report, Arbor Networks (2001)
-
(2001)
-
-
Song, D.1
Malan, R.2
Stone, R.3
-
80
-
-
85084162258
-
How to own the Internet in your spare time
-
Staniford, S., Paxson, V., Weaver, N.: How to own the Internet in your spare time. In: Proceedings of the 11th USENIX Security Symposium, pp. 149-167 (2002)
-
(2002)
Proceedings of the 11th USENIX Security Symposium
, pp. 149-167
-
-
Staniford, S.1
Paxson, V.2
Weaver, N.3
-
81
-
-
35348976981
-
Defeating compiler-level buffer overflow protection
-
login
-
Steven, A.: Defeating compiler-level buffer overflow protection. USENIX;login: 30, 59-71 (2005)
-
(2005)
USENIX
, vol.30
, pp. 59-71
-
-
Steven, A.1
-
82
-
-
12844267418
-
Secure program execution via dynamic information flow tracking
-
Suh, G.E., Lee, J.W., Zhang, D., Devadas, S.: Secure program execution via dynamic information flow tracking. SIGOPS Oper. Syst. Rev. 38, 85-96 (2004)
-
(2004)
SIGOPS Oper. Syst. Rev.
, vol.38
, pp. 85-96
-
-
Suh, G.E.1
Lee, J.W.2
Zhang, D.3
Devadas, S.4
-
83
-
-
84969564072
-
One-way isolation: An effective approach for realizing safe execution environments
-
Sun, W., Liang, Z., Sekar, R., Venkatakrishnan, V.N.: One-way isolation: an effective approach for realizing safe execution environments. In: Proceedings of the 12th ISOC Symposium on Network and Distributed Systems Security (SNDSS), pp. 265-278 (2005)
-
(2005)
Proceedings of the 12th ISOC Symposium on Network and Distributed Systems Security (SNDSS)
, pp. 265-278
-
-
Sun, W.1
Liang, Z.2
Sekar, R.3
Venkatakrishnan, V.N.4
-
85
-
-
33645958072
-
-
The Spread of the Sapphire/Slammer Worm
-
The Spread of the Sapphire/Slammer Worm. http://www.silicondefense.com/ research/worms/slammer.php (2003)
-
(2003)
-
-
-
88
-
-
33646008982
-
-
Vendicator: Stack shield
-
Vendicator: Stack shield. http://www.angelfire.com/sk/stackshield/ (2000)
-
(2000)
-
-
-
89
-
-
85081874807
-
A first step towards automated detection of buffer overrun vulnerabilities
-
Wagner, D., Foster, J.S., Brewer, E.A., Aiken, A.: A first step towards automated detection of buffer overrun vulnerabilities. In: Network and Distributed System Security Symposium, pp. 3-17 (2000)
-
(2000)
Network and Distributed System Security Symposium
, pp. 3-17
-
-
Wagner, D.1
Foster, J.S.2
Brewer, E.A.3
Aiken, A.4
-
90
-
-
85084161648
-
Confining root programs with domain and type enforcement
-
Walker, K.M., Stern, D.F., Badger, L., Oosendorp, K.A., Petkac, M.J., Sherman, D.L.: Confining root programs with domain and type enforcement. In: Proceedings of the 1996 USENIX Security Symposium, pp. 21-36 (1996)
-
(1996)
Proceedings of the 1996 USENIX Security Symposium
, pp. 21-36
-
-
Walker, K.M.1
Stern, D.F.2
Badger, L.3
Oosendorp, K.A.4
Petkac, M.J.5
Sherman, D.L.6
-
91
-
-
27544510809
-
Shield: Vulnerability-driven network filters for preventing known vulnerability exploits
-
Wang, H.J., Guo, C., Simon, D.R., Zugenmaier, A.: Shield: vulnerability-driven network filters for preventing known vulnerability exploits. In: Proceedings of the ACM SIGCOMM Conference (2004)
-
(2004)
Proceedings of the ACM SIGCOMM Conference
-
-
Wang, H.J.1
Guo, C.2
Simon, D.R.3
Zugenmaier, A.4
-
92
-
-
84968854658
-
Y-Branches: When you come to a fork in the road, take it
-
Wang, N., Fertig, M., Patel, S.: Y-Branches: When you come to a fork in the road, take it. In: Proceedings of the 12th International Conference on Parallel Architectures and Compilation Techniques (2003)
-
(2003)
Proceedings of the 12th International Conference on Parallel Architectures and Compilation Techniques
-
-
Wang, N.1
Fertig, M.2
Patel, S.3
-
94
-
-
85084164480
-
Very fast containment of scanning worms
-
Weaver, N., Staniford, S., Paxson, V.: Very fast containment of scanning worms. In: Proceedings of the 13th USENIX Security Symposium, pp. 29-44 (2004)
-
(2004)
Proceedings of the 13th USENIX Security Symposium
, pp. 29-44
-
-
Weaver, N.1
Staniford, S.2
Paxson, V.3
-
95
-
-
4544303625
-
Dynamic quarantine of Internet worms
-
Washington, DC, IEEE Computer Society
-
Wong, C., Wang, C., Song, D., Bielski, S., Ganger, G.R.: Dynamic quarantine of Internet worms. In: DSN '04: Proceedings of the 2004 International Conference on Dependable Systems and Networks (DSN'04), p. 73. Washington, DC, IEEE Computer Society, (2004)
-
(2004)
DSN '04: Proceedings of the 2004 International Conference on Dependable Systems and Networks (DSN'04)
, pp. 73
-
-
Wong, C.1
Wang, C.2
Song, D.3
Bielski, S.4
Ganger, G.R.5
-
96
-
-
35048867316
-
On the design and use of Internet sinks for network abuse monitoring
-
Yegneswaran, V., Barford, P., Plonka, D.: On the design and use of Internet sinks for network abuse monitoring. In: Proceedings of the 7th International Symposium on Recent Advances in Intrusion Detection (RAID), pp. 146-165 (2004)
-
(2004)
Proceedings of the 7th International Symposium on Recent Advances in Intrusion Detection (RAID)
, pp. 146-165
-
-
Yegneswaran, V.1
Barford, P.2
Plonka, D.3
-
97
-
-
16344396406
-
Monitoring and early warning for Internet worms
-
Zou, C.C., Gao, L., Gong, W., Towsley, D.: Monitoring and early warning for Internet worms. In: Proceedings of the 10th ACM International Conference on Computer and Communications Security (CCS), pp. 190-199 (2003)
-
(2003)
Proceedings of the 10th ACM International Conference on Computer and Communications Security (CCS)
, pp. 190-199
-
-
Zou, C.C.1
Gao, L.2
Gong, W.3
Towsley, D.4
-
98
-
-
0038349210
-
Code Red worm propagation modeling and analysis
-
Zou, C.C., Gong, W., Towsley, D.: Code Red worm propagation modeling and analysis. In: Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS), pp. 138-147 (2002)
-
(2002)
Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS)
, pp. 138-147
-
-
Zou, C.C.1
Gong, W.2
Towsley, D.3
|