-
1
-
-
21644433634
-
Xen and the art of virtualization
-
Oct.
-
P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield. Xen and the art of virtualization. In Proceedings of the 19th ACM Symposium on Operating Systems Principles (SOSP 2003), pages 164-177, Oct. 2003.
-
(2003)
Proceedings of the 19th ACM Symposium on Operating Systems Principles (SOSP 2003)
, pp. 164-177
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Warfield, A.9
-
3
-
-
85084160243
-
StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks
-
Jan.
-
C. Cowan, C. Pu, D. Maier, J. Walpole, P. Bakke, S. Beattie, A. Grier, P. Wagle, Q. Zhang, and H. Hinton. StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks. In Proceedings of the 7th USENIX Security Symposium, pages 63-78, Jan. 1998.
-
(1998)
Proceedings of the 7th USENIX Security Symposium
, pp. 63-78
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Walpole, J.4
Bakke, P.5
Beattie, S.6
Grier, A.7
Wagle, P.8
Zhang, Q.9
Hinton, H.10
-
4
-
-
35048879637
-
Honeystat: Local worm detection using honeypots
-
Sept.
-
D. Dagon, X. Qin, G. Gu, W. Lee, J. B. Grizzard, J. G. Levine, and H. L. Owen. Honeystat: Local worm detection using honeypots. In Recent Advances in Intrusion Detection: 7th International Symposium, (RAID) 2004, pages 39-58, Sept. 2004.
-
(2004)
Recent Advances in Intrusion Detection: 7th International Symposium, (RAID) 2004
, pp. 39-58
-
-
Dagon, D.1
Qin, X.2
Gu, G.3
Lee, W.4
Grizzard, J.B.5
Levine, J.G.6
Owen, H.L.7
-
6
-
-
84858907430
-
-
J. Dike. UML as a honeypot, 2005. http://user-mode-linux.sourceforge.net/ honeypots.html.
-
(2005)
UML As A Honeypot
-
-
Dike, J.1
-
7
-
-
84978401615
-
ReVirt: Enabling intrusion analysis through virtual-machine logging and replay
-
Dec.
-
G. W. Dunlap, S. T. King, S. Cinar, M. A. Basrai, and P. M. Chen. ReVirt: Enabling intrusion analysis through virtual-machine logging and replay. In Proceedings of the 5th Symposium on Operating Systems Design and Implementation (OSDI 2002), pages 211-224, Dec. 2002.
-
(2002)
Proceedings of the 5th Symposium on Operating Systems Design and Implementation (OSDI 2002)
, pp. 211-224
-
-
Dunlap, G.W.1
King, S.T.2
Cinar, S.3
Basrai, M.A.4
Chen, P.M.5
-
11
-
-
67651038840
-
A REAL NT rootkit
-
G. Hoglund. A REAL NT rootkit. Phrack Magazine, 9(55), 1999. http://www.phrack.org/phrack/55/P55-05.
-
(1999)
Phrack Magazine
, vol.9
, Issue.55
-
-
Hoglund, G.1
-
13
-
-
85084164812
-
Collapsar: A VM-based architecture for network attack detention center
-
Aug.
-
X. Jiang and D. Xu. Collapsar: A VM-based architecture for network attack detention center. In Proceedings of the 13th USENIX Security Symposium, pages 15-28, Aug. 2004.
-
(2004)
Proceedings of the 13th USENIX Security Symposium
, pp. 15-28
-
-
Jiang, X.1
Xu, D.2
-
14
-
-
84885639914
-
Detecting pact and present intrusions through vulnerability-specific predicates
-
Oct.
-
A. Joshi, S. T. King, G. W. Dunlap, and P. M. Chen. Detecting pact and present intrusions through vulnerability-specific predicates. In Proceedings of the 20th ACM Symposium on Operating Systems Principles (SOSP 2005), pages 91-104, Oct. 2005.
-
(2005)
Proceedings of the 20th ACM Symposium on Operating Systems Principles (SOSP 2005)
, pp. 91-104
-
-
Joshi, A.1
King, S.T.2
Dunlap, G.W.3
Chen, P.M.4
-
16
-
-
33745935734
-
Dionaea: On the automatic collection of malicious code samples through honey pot farms
-
Invited talk at the
-
E. Levy. Dionaea: On the automatic collection of malicious code samples through honey pot farms, 2005. Invited talk at the GASCON 2005 Workshop on Cybersecurity.
-
(2005)
GASCON 2005 Workshop on Cybersecurity
-
-
Levy, E.1
-
17
-
-
33745941729
-
-
Private conversation . Symantec Corp.
-
E. Levy. Private conversation, 2005. Symantec Corp.
-
(2005)
-
-
Levy, E.1
-
18
-
-
84858922653
-
-
LIDS Toolkit, 2005. http://www.lids.org.
-
(2005)
-
-
-
20
-
-
84858923855
-
-
Metasploit, 2005. http://www.metasploit.com.
-
(2005)
-
-
-
21
-
-
85084162914
-
Copilot - A coprocessor-based kernel runtime integrity monitor
-
Aug.
-
N. L. Petroni Jr., T. Fraser, J. Molina, and W. A. Arbaugh. Copilot - a coprocessor-based kernel runtime integrity monitor. In Proceedings of the 13th USENIX Security Symposium, pages 179-194, Aug. 2004.
-
(2004)
Proceedings of the 13th USENIX Security Symposium
, pp. 179-194
-
-
Petroni Jr., N.L.1
Fraser, T.2
Molina, J.3
Arbaugh, W.A.4
-
23
-
-
84885617227
-
Pioneer: Verifying code integrity and enforcing untampered code execution on legacy systems
-
Oct.
-
A. Seshadri, M. Luk, E. Shi, A. Perrig, L. van Doom, and P. Khosla. Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems. In Proceedings of the 20th ACM Symposium on Operating Systems Principles (SOSP 2005), pages 1-16, Oct. 2005.
-
(2005)
Proceedings of the 20th ACM Symposium on Operating Systems Principles (SOSP 2005)
, pp. 1-16
-
-
Seshadri, A.1
Luk, M.2
Shi, E.3
Perrig, A.4
Van Doom, L.5
Khosla, P.6
-
24
-
-
84858915840
-
Know your enemy: A forensic analysis
-
Honeynet Project, May
-
L. Spitzner. Know your enemy: A forensic analysis. Technical report, Honeynet Project, May 2000. http://www.honey-net.org/papers/forensics.
-
(2000)
Technical Report
-
-
Spitzner, L.1
-
25
-
-
84858921768
-
-
The Honeynet Project, 2005. http://www.honeynet.org.
-
(2005)
-
-
-
26
-
-
84885575254
-
Scalability, fidelity, and containment in the Potemkin virtual honeyfarm
-
Oct.
-
M. Vrable, J. Ma, J. Chen, D. Moore, E. Vandekieft, A. C. Snoeren, G. M. Voelker, and S. Savage. Scalability, fidelity, and containment in the Potemkin virtual honeyfarm. In Proceedings of the 20th ACM Symposium on Operating Systems Principles (SOSP 2005), pages 148-162, Oct. 2005.
-
(2005)
Proceedings of the 20th ACM Symposium on Operating Systems Principles (SOSP 2005)
, pp. 148-162
-
-
Vrable, M.1
Ma, J.2
Chen, J.3
Moore, D.4
Vandekieft, E.5
Snoeren, A.C.6
Voelker, G.M.7
Savage, S.8
-
27
-
-
77954517653
-
Secure coprocessor-based intrusion detection
-
Sept.
-
X. Zhang, L. van Doom, T. Jaeger, R. Perez, and R. Sailer. Secure coprocessor-based intrusion detection. In Proceedings of the 10th ACM SIGOPS European Workshop, Sept. 2002.
-
(2002)
Proceedings of the 10th ACM SIGOPS European Workshop
-
-
Zhang, X.1
Van Doom, L.2
Jaeger, T.3
Perez, R.4
Sailer, R.5
|