-
1
-
-
33750343827
-
Advanced polymorphic worms: Evading IDS by blending in with normal traffic
-
Vancouver, BC, Canada
-
Kolesnikov, O., D. Dagon, and W. Lee, Advanced Polymorphic Worms: Evading IDS by Blending in with Normal Traffic, in USENIX Security Symposium. 2006: Vancouver, BC, Canada.
-
(2006)
USENIX Security Symposium
-
-
Kolesnikov, O.1
Dagon, D.2
Lee, W.3
-
2
-
-
0042474173
-
Internet quarantine: Requirements for containing self-propagating code
-
Moore, D., et al. Internet Quarantine: Requirements for Containing Self-Propagating Code, in INFOCOM. 2003.
-
(2003)
INFOCOM
-
-
Moore, D.1
-
4
-
-
84924223669
-
Static analysis of executables to detect malicious patterns
-
Washington, D.C.
-
Christodorescu, M. and S. Jha. Static Analysis of Executables to Detect Malicious Patterns, in USENIX Security Symposium. 2003. Washington, D.C.
-
(2003)
USENIX Security Symposium
-
-
Christodorescu, M.1
Jha, S.2
-
6
-
-
33746389292
-
Polymorphic worm detection using structural information of executables
-
Seattle, WA
-
Kruegel, C., et al. Polymorphic Worm Detection Using Structural Information of Executables, in Symposium on Recent Advances in Intrusion Detection. 2005. Seattle, WA.
-
(2005)
Symposium on Recent Advances in Intrusion Detection
-
-
Kruegel, C.1
-
7
-
-
0038011179
-
Specification-based anomaly detection: A new approach for detecting network intrusions
-
Washington, D.C.
-
Sekar, R., et al. Specification-based Anomaly Detection: A New Approach for Detecting Network Intrusions, in ACM Conference on Computer and Communications Security. 2002. Washington, D.C.
-
(2002)
ACM Conference on Computer and Communications Security
-
-
Sekar, R.1
-
8
-
-
0036038437
-
Service specific anomaly detection for network intrusion detection
-
Madrid, Spain
-
Kruegel, C., T. Toth, and E. Kirda. Service Specific Anomaly Detection for Network Intrusion Detection, in Symposium on Applied Computing (SAC). 2002. Madrid, Spain.
-
(2002)
Symposium on Applied Computing (SAC)
-
-
Kruegel, C.1
Toth, T.2
Kirda, E.3
-
9
-
-
85027555608
-
SigFree: A signature-free buffer overflow attack blocker
-
Boston, MA
-
Wang, X., et al. SigFree: A Signature-free Buffer Overflow Attack Blocker, in USENIX Security. 2006. Boston, MA.
-
(2006)
USENIX Security
-
-
Wang, X.1
-
12
-
-
84941159825
-
-
[cited 2006 April 4]
-
SourceFire Inc. Snort rulesets. 2006 [cited 2006 April 4]; Available from: http://www.snort.org/pub-bin/downloads.cgi.
-
(2006)
Snort Rulesets
-
-
-
13
-
-
33745673185
-
Application communities: Using monoculture for dependability
-
Locasto, M.E., S. Sidiroglou, and A.D. Keromytis. Application Communities: Using Monoculture for Dependability, in HotDep. 2005.
-
(2005)
HotDep
-
-
Locasto, M.E.1
Sidiroglou, S.2
Keromytis, A.D.3
-
15
-
-
0034593307
-
Characterizing the behavior of a program using multiple-length N-grams
-
Cork, Ireland
-
Marceau, C. Characterizing the Behavior of a Program Using Multiple-Length N-grams. in New Security Paradigms Workshop. 2000. Cork, Ireland.
-
(2000)
New Security Paradigms Workshop
-
-
Marceau, C.1
-
17
-
-
0036085540
-
Why 6? Defining the operational limits of slide, an anomaly-based intrusion detector
-
Berkeley, CA
-
Tan, K.M.C. and R.A. Maxion. Why 6? Defining the Operational Limits of slide, an Anomaly-Based Intrusion Detector, in IEEE Symposium on Security and Privacy. 2002. Berkeley, CA.
-
(2002)
IEEE Symposium on Security and Privacy
-
-
Tan, K.M.C.1
Maxion, R.A.2
-
18
-
-
33745788387
-
On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits
-
Alexandria, VA
-
Crandall, J.R., et al. On Deriving Unknown Vulnerabilities from Zero-Day Polymorphic and Metamorphic Worm Exploits, in ACM Conference on Computer and Communications Security. 2005. Alexandria, VA.
-
(2005)
ACM Conference on Computer and Communications Security
-
-
Crandall, J.R.1
-
19
-
-
27544498978
-
Polygraph: Automatically generating signatures for polymorphic worms
-
Oakland, CA
-
Newsome, J., B. Karp, and D. Song. Polygraph: Automatically Generating Signatures. for Polymorphic Worms, in IEEE Security and Privacy. 2005. Oakland, CA.
-
(2005)
IEEE Security and Privacy
-
-
Newsome, J.1
Karp, B.2
Song, D.3
-
21
-
-
0014814325
-
Space/time trade-offs in Hash coding with allowable errors
-
Bloom, B.H., Space/time trade-offs in Hash Coding with Allowable Errors. Communications of the ACM, 1970.13(7): p. 422-426.
-
(1970)
Communications of the ACM
, vol.13
, Issue.7
, pp. 422-426
-
-
Bloom, B.H.1
-
22
-
-
0024867751
-
Universal one-way Hash functions and their cryptographic applications
-
Seattle, WA
-
Naor, M. and M. Yung. Universal One-Way Hash Functions and their Cryptographic Applications, in ACM Symposium on Theory of Computing. 1989. Seattle, WA.
-
(1989)
ACM Symposium on Theory of Computing
-
-
Naor, M.1
Yung, M.2
-
23
-
-
34248345975
-
Privacy-preserving payload-based correlation for accurate malicious traffic detection
-
Pisa, Italy
-
Parekh, J.J., K. Wang, and S.J. Stolfo. Privacy-Preserving Payload-Based Correlation for Accurate Malicious Traffic Detection, in Large-Scale Attack Detection, Workshop at SIGCOMM. 2006. Pisa, Italy.
-
(2006)
Large-scale Attack Detection, Workshop at SIGCOMM
-
-
Parekh, J.J.1
Wang, K.2
Stolfo, S.J.3
-
25
-
-
33845989821
-
Can machine learning be secure?
-
Barreno, M., et al. Can Machine Learning Be Secure? in ASIACCS. 2006.
-
(2006)
ASIACCS
-
-
Barreno, M.1
-
26
-
-
85084160243
-
StackGuard: Automatic adaptive detection and prevention of bufferOverflow attacks
-
San Antonio, TX
-
Cowan, C., et al. StackGuard: Automatic Adaptive Detection and Prevention of BufferOverflow Attacks, in USENIX Security Symposium. 1998. San Antonio, TX.
-
(1998)
USENIX Security Symposium
-
-
Cowan, C.1
-
27
-
-
84906497159
-
Building a reactive immune system for software services
-
Anaheim, CA
-
Sidiroglou, S., et al. Building a Reactive Immune System for Software Services, in USENIX. 2005. Anaheim, CA.
-
(2005)
USENIX
-
-
Sidiroglou, S.1
-
30
-
-
33750353041
-
-
Columbia University Department of Computer Science: New York, NY
-
Locasto, M.E., M. Burnside, and A.D. Keromytis, Bloodhound: Searching Out Malicious Input in Network Flows for Automatic Repair Validation. 2006, Columbia University Department of Computer Science: New York, NY.
-
(2006)
Bloodhound: Searching out Malicious Input in Network Flows for Automatic Repair Validation
-
-
Locasto, M.E.1
Burnside, M.2
Keromytis, A.D.3
-
31
-
-
33646048960
-
Honeycomb - Creating intrusion detection signatures using honeypots
-
Boston, MA
-
Kreibich, C. and J. Crowcroft. Honeycomb - Creating Intrusion Detection Signatures Using Honeypots. in ACM Workshop on Hot Topics in Networks. 2003. Boston, MA.
-
(2003)
ACM Workshop on Hot Topics in Networks
-
-
Kreibich, C.1
Crowcroft, J.2
-
32
-
-
4544295719
-
The earlyBird system for real-time detection of unknown worms
-
Boston, MA
-
Singh, S., et al. The EarlyBird System for Real-Time Detection of Unknown Worms, in ACM Workshop on Hot Topics in Networks. 2003. Boston, MA.
-
(2003)
ACM Workshop on Hot Topics in Networks
-
-
Singh, S.1
-
33
-
-
85084163246
-
Autograph: Toward automated, distributed worm signature detection
-
San Diego, CA
-
Kim, H.-A. and B. Karp. Autograph: Toward Automated, Distributed Worm Signature Detection, in USENIX Security Symposium. 2004. San Diego, CA.
-
(2004)
USENIX Security Symposium
-
-
Kim, H.-A.1
Karp, B.2
-
34
-
-
33750352075
-
Shield: Vulnerability-driven network filters for preventing known vulnerability exploits
-
Wang, HJ., et al. Shield: Vulnerability-Driven Network Filters for Preventing Known Vulnerability Exploits. in ACM SIGCOMM. 2004.
-
(2004)
ACM SIGCOMM
-
-
Wang, H.J.1
-
35
-
-
33745800070
-
Fast and automated generation of attack signatures: A basis for building self-protecing servers
-
Alexandria, VA
-
Liang, Z. and R. Sekar. Fast and Automated Generation of Attack Signatures: A Basis for Building Self-Protecing Servers, in ACM Conference on Computer and Communications Security. 2005. Alexandria, VA.
-
(2005)
ACM Conference on Computer and Communications Security
-
-
Liang, Z.1
Sekar, R.2
-
36
-
-
84888375990
-
-
[cited 2006 March 29]
-
K2. ADMmutate. 2001 [cited 2006 March 29]; Available from: http://www.ktwo.ca/security.html.
-
(2001)
ADMmutate
-
-
-
37
-
-
0034836394
-
Intrusion detection via static analysis
-
Oakland, CA
-
Wagner, D. and D. Dean. Intrusion Detection via Static Analysis, in IEEE Security and Privacy. 2001. Oakland, CA.
-
(2001)
IEEE Security and Privacy
-
-
Wagner, D.1
Dean, D.2
-
38
-
-
0038011184
-
Mimicry attacks on host-based intrusion detection systems
-
Wagner, D. and P. Soto. Mimicry Attacks on Host-Based Intrusion Detection Systems. in ACM CCS. 2002.
-
(2002)
ACM CCS
-
-
Wagner, D.1
Soto, P.2
|