-
1
-
-
33845989821
-
Can machine learning be secure?
-
March
-
Marco Barreno, Blaine Nelson, Russell Sears, Anthony D. Joseph, and J. D. Tygar. Can machine learning be secure? In ASIA CCS, March 2006.
-
(2006)
ASIA CCS
-
-
Barreno, M.1
Nelson, B.2
Sears, R.3
Joseph, A.D.4
Tygar, J.D.5
-
2
-
-
33751056900
-
Towards automatic generation of vulnerability-based signatures
-
David Brumley, James Newsome, Dawn Song, Hao Wang, and Somesh Jha. Towards automatic generation of vulnerability-based signatures. In IEEE Symposium on Security and Privacy, 2006.
-
(2006)
IEEE Symposium on Security and Privacy
-
-
Brumley, D.1
Newsome, J.2
Song, D.3
Wang, H.4
Jha, S.5
-
3
-
-
84885679117
-
Vigilante: End-to-end containment of internet worms
-
Manuel Costa, Jon Crowcroft, Miguel Castro, and Antony Rowstron. Vigilante: End-to-end containment of internet worms. In SOSP, 2005.
-
(2005)
SOSP
-
-
Costa, M.1
Crowcroft, J.2
Castro, M.3
Rowstron, A.4
-
4
-
-
33750355107
-
Minos: Architectural support for software security through control data integrity
-
December
-
Jedidiah R. Crandall and Fred Chong. Minos: Architectural support for software security through control data integrity. In International Symposium on Microarchitecture, December 2004.
-
(2004)
International Symposium on Microarchitecture
-
-
Crandall, J.R.1
Chong, F.2
-
7
-
-
85084163246
-
Autograph: Toward automated, distributed worm signature detection
-
August
-
Hyang-Ah Kim and Brad Karp. Autograph: toward automated, distributed worm signature detection. In 13th USENIX Security Symposium, August 2004.
-
(2004)
13th USENIX Security Symposium
-
-
Kim, H.-A.1
Karp, B.2
-
8
-
-
33646048960
-
Honeycomb - Creating intrusion detection signatures using honeypots
-
November
-
Christian Kreibich and Jon Crowcroft. Honeycomb - creating intrusion detection signatures using honeypots. In HotNets, November 2003.
-
(2003)
HotNets
-
-
Kreibich, C.1
Crowcroft, J.2
-
9
-
-
33751064824
-
Hamsa: Fast signature generation for zero-day polymorphic worms with provable attack resilience
-
May
-
Zhichun Li, Manan Sanghi, Yan Chen, Ming-Yang Kao, and Brian Chavez. Hamsa: fast signature generation for zero-day polymorphic worms with provable attack resilience. In IEEE Symposium on Security and Privacy, May 2006.
-
(2006)
IEEE Symposium on Security and Privacy
-
-
Li, Z.1
Sanghi, M.2
Chen, Y.3
Kao, M.-Y.4
Chavez, B.5
-
11
-
-
34250091945
-
Learning quickly when irrelevant attributes abound: A new linear threshold algorithm
-
N. Littlestone. Learning quickly when irrelevant attributes abound: A new linear threshold algorithm. Machine Learning, 2(285-318), 1988.
-
(1988)
Machine Learning
, vol.2
, Issue.285-318
-
-
Littlestone, N.1
-
12
-
-
0000511449
-
Redundant noisy attributes, attribute errors, and linear-threshold learning using winnow
-
N. Littlestone. Redundant noisy attributes, attribute errors, and linear-threshold learning using winnow. In Fourth Annual Workshop on Computational Learning Theory, pages 147-156, 1991.
-
(1991)
Fourth Annual Workshop on Computational Learning Theory
, pp. 147-156
-
-
Littlestone, N.1
-
16
-
-
79953672829
-
Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
-
February
-
James Newsome and Dawn Song. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In 12th Annual Network and Distributed System Security Symposium (NDSS), February 2005.
-
(2005)
12th Annual Network and Distributed System Security Symposium (NDSS)
-
-
Newsome, J.1
Song, D.2
-
17
-
-
33750330136
-
Delusive (definition)
-
Oxford University Press
-
delusive (definition). In Oxford English Dictionary, Oxford University Press, 2006.
-
(2006)
Oxford English Dictionary
-
-
-
18
-
-
33751051489
-
Misleading worm signature generators using deliberate noise injection
-
May
-
Roberto Perdisci, David Dagon, Wenke Lee, Prahlad Fogla, and Monirul Sharif. Misleading worm signature generators using deliberate noise injection. In IEEE Symposium on Security and Privacy, May 2006.
-
(2006)
IEEE Symposium on Security and Privacy
-
-
Perdisci, R.1
Dagon, D.2
Lee, W.3
Fogla, P.4
Sharif, M.5
-
19
-
-
33751040191
-
-
Yann Ramin. ATPhttpd. http://www.redshift.com/~yramin/atp/atphttpd/.
-
ATPhttpd
-
-
Ramin, Y.1
-
23
-
-
12844267418
-
Secure program execution via dynamic information flow tracking
-
G. Edward Suh, Jaewook Lee, and Srinivas Devadas. Secure program execution via dynamic information flow tracking. In ASPLOS, 2004.
-
(2004)
ASPLOS
-
-
Suh, G.E.1
Lee, J.2
Devadas, S.3
-
24
-
-
25844462447
-
Defending against internet worms: A signature-based approach
-
March
-
Yong Tang and Shigang Chen. Defending against internet worms: A signature-based approach. In IEEE INFOCOM, March 2005.
-
(2005)
IEEE INFOCOM
-
-
Tang, Y.1
Chen, S.2
-
25
-
-
33745803872
-
Automatic diagnosis and response to memory corruption vulnerabilities
-
Jun Xu, Peng Ning, Chongkyung Kil, Yan Zhai, and Chris Bookholt. Automatic diagnosis and response to memory corruption vulnerabilities. In 12th Annual ACM Conference on Computer and Communication Security (CCS), 2005.
-
(2005)
12th Annual ACM Conference on Computer and Communication Security (CCS)
-
-
Xu, J.1
Ning, P.2
Kil, C.3
Zhai, Y.4
Bookholt, C.5
|