-
1
-
-
33846321443
-
-
The PaX team
-
The PaX team, http://pax.grsecurity.net.
-
-
-
-
2
-
-
18744376889
-
-
E. Barrantes et al. Randomized instruction set emulation to disrupt binary code injection attacks. In CCS, 2003.
-
E. Barrantes et al. Randomized instruction set emulation to disrupt binary code injection attacks. In CCS, 2003.
-
-
-
-
3
-
-
84862209017
-
Address obfuscation: An efficient approach to combat a broad range of memory error exploits
-
S. Bhatkar, D. DuVarney, and R. Sekar. Address obfuscation: An efficient approach to combat a broad range of memory error exploits. In USENIX Security, 2003.
-
(2003)
USENIX Security
-
-
Bhatkar, S.1
DuVarney, D.2
Sekar, R.3
-
4
-
-
84954188728
-
Efficient techniques for comprehensive protection from memory error exploits
-
S. Bhatkar, R. Sekar, and D. DuVarney. Efficient techniques for comprehensive protection from memory error exploits. In USENIX Security, 2005.
-
(2005)
USENIX Security
-
-
Bhatkar, S.1
Sekar, R.2
DuVarney, D.3
-
5
-
-
0035017559
-
RAD: A compile-time solution to buffer overflow attacks
-
T. Chiueh and F. Hsu. RAD: A compile-time solution to buffer overflow attacks. In ICDCS, 2001.
-
(2001)
ICDCS
-
-
Chiueh, T.1
Hsu, F.2
-
6
-
-
84885679117
-
Vigilante: End-to-end containment of Internet worms
-
M. Costa et al. Vigilante: End-to-end containment of Internet worms, In SOSP, 2005.
-
(2005)
SOSP
-
-
Costa, M.1
-
7
-
-
85084160243
-
StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks
-
C. Cowan et al. StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks. In USENIX Security, 1998.
-
(1998)
USENIX Security
-
-
Cowan, C.1
-
9
-
-
33846325324
-
Anomaly detection using call stack information
-
H. Feng et al. Anomaly detection using call stack information. In IEEE S&P, 2003.
-
(2003)
IEEE S&P
-
-
Feng, H.1
-
10
-
-
33846312311
-
Efficient context-sensitive intrusion detection
-
J. Giffin, S. Jha, and B. Miller. Efficient context-sensitive intrusion detection. In NDSS, 2004.
-
(2004)
NDSS
-
-
Giffin, J.1
Jha, S.2
Miller, B.3
-
11
-
-
33745777666
-
CTCP: A centralized TCP/IP architecture for networking security
-
F. Hsu and T. Chiueh. CTCP: A centralized TCP/IP architecture for networking security. In ACSAC, 2004.
-
(2004)
ACSAC
-
-
Hsu, F.1
Chiueh, T.2
-
13
-
-
12544250338
-
Backwards-compatible bounds checking for arrays and pointers in C programs
-
R. Jones and P. Kelly. Backwards-compatible bounds checking for arrays and pointers in C programs, In Intl. Workshop on Automated Debugging, 1997.
-
(1997)
Intl. Workshop on Automated Debugging
-
-
Jones, R.1
Kelly, P.2
-
14
-
-
14844317200
-
Countering code-injection attacks with instruction-set randomization
-
G. Kc, A. Keromytis, and V. Prevelakis. Countering code-injection attacks with instruction-set randomization, In ACM CCS, 2003.
-
(2003)
ACM CCS
-
-
Kc, G.1
Keromytis, A.2
Prevelakis, V.3
-
15
-
-
85084163246
-
Autograph: Toward automated, distributed worm signature detection
-
H. Kim and B. Karp. Autograph: Toward automated, distributed worm signature detection. In USENIX Security, 2004.
-
(2004)
USENIX Security
-
-
Kim, H.1
Karp, B.2
-
16
-
-
33646048960
-
Honeycomb - creating intrusion detection signatures using honeypots
-
C. Kreibich and J. Crowcroft. Honeycomb - creating intrusion detection signatures using honeypots. In HotNets-II, 2003.
-
(2003)
HotNets
, vol.2
-
-
Kreibich, C.1
Crowcroft, J.2
-
18
-
-
78650863969
-
Automatic synthesis of filters to discard buffer overflow attacks: A step towards realizing self-healing systems
-
Z. Liang, R. Sekar, and D. DuVarney. Automatic synthesis of filters to discard buffer overflow attacks: A step towards realizing self-healing systems. In USENIX Annual Technical Conference, (Short Paper) 2005.
-
(2005)
USENIX Annual Technical Conference, (Short Paper)
-
-
Liang, Z.1
Sekar, R.2
DuVarney, D.3
-
19
-
-
33745800070
-
-
Z. Liang and R. Sekar. Fast and automated generation of attack signatures: A basis for building self-protecting servers. In CCS, 2005.
-
Z. Liang and R. Sekar. Fast and automated generation of attack signatures: A basis for building self-protecting servers. In CCS, 2005.
-
-
-
-
21
-
-
0036040304
-
CCured: Type-safe retrofitting of legacy code
-
G. Necula, S. McPeak, and W. Weimer. CCured: type-safe retrofitting of legacy code. In POPL, 2002.
-
(2002)
POPL
-
-
Necula, G.1
McPeak, S.2
Weimer, W.3
-
22
-
-
33745772237
-
Polygraph: Automatically generating signatures for polymorphic worms
-
J. Newsome et al. Polygraph: Automatically generating signatures for polymorphic worms. In IEEE S&P, 2005.
-
(2005)
IEEE S&P
-
-
Newsome, J.1
-
23
-
-
79953672829
-
Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
-
J. Newsome and D. Song. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In NDSS, 2005.
-
(2005)
NDSS
-
-
Newsome, J.1
Song, D.2
-
24
-
-
26444472580
-
Buttercup: On network-based detection of polymorphic buffer overflow vulnerabilities
-
A. Pasupulati et al. Buttercup: On network-based detection of polymorphic buffer overflow vulnerabilities. In IEEE/IFIP Network Operation and Management Symposium, 2004.
-
(2004)
IEEE/IFIP Network Operation and Management Symposium
-
-
Pasupulati, A.1
-
25
-
-
2642547913
-
On-line intrusion detection and attack prevention using diversity, generate-and-test, and generalization
-
J. Reynolds et al. On-line intrusion detection and attack prevention using diversity, generate-and-test, and generalization. Hawaii Intl. Conference on System Sciences, 2003.
-
(2003)
Hawaii Intl. Conference on System Sciences
-
-
Reynolds, J.1
-
26
-
-
21644473822
-
A dynamic technique for eliminating buffer overflow vulnerabilities (and other memory errors)
-
M. Rinard et al. A dynamic technique for eliminating buffer overflow vulnerabilities (and other memory errors). In ACSAC, 2004.
-
(2004)
ACSAC
-
-
Rinard, M.1
-
27
-
-
77954504457
-
A practical dynamic buffer overflow detector
-
O. Ruwase and M. Lam. A practical dynamic buffer overflow detector. In NDSS, 2004.
-
(2004)
NDSS
-
-
Ruwase, O.1
Lam, M.2
-
28
-
-
20444442399
-
A fast automaton-based method for detecting anomalous program behaviors
-
R. Sekar et al. A fast automaton-based method for detecting anomalous program behaviors. In IEEE S&P, 2001.
-
(2001)
IEEE S&P
-
-
Sekar, R.1
-
29
-
-
84944412883
-
A network worm vaccine architecture
-
S. Sidiroglou and A. Keromytis. A network worm vaccine architecture. In WETICE, 2003.
-
(2003)
WETICE
-
-
Sidiroglou, S.1
Keromytis, A.2
-
31
-
-
84991765629
-
Automated worm fingerprinting
-
S. Singh et al. Automated worm fingerprinting. In OSDI, 2004.
-
(2004)
OSDI
-
-
Singh, S.1
-
32
-
-
85180409373
-
DIRA: Automatic detection, identification and repair of control-hijacking attacks
-
A. Smirnov and T. Chiueh. DIRA: Automatic detection, identification and repair of control-hijacking attacks. In NDSS, 2005.
-
(2005)
NDSS
-
-
Smirnov, A.1
Chiueh, T.2
-
33
-
-
25844462447
-
Defending against Internet worms: A signature-based approach
-
Y. Tang and S. Chen. Defending against Internet worms: A signature-based approach. In INFOCOM, 2005.
-
(2005)
INFOCOM
-
-
Tang, Y.1
Chen, S.2
-
34
-
-
1642268792
-
Accurate buffer overflow detection via abstract payload execution, la
-
T. Toth and C. Kruegel. Accurate buffer overflow detection via abstract payload execution, la. RAID, 2002.
-
(2002)
RAID
-
-
Toth, T.1
Kruegel, C.2
-
35
-
-
35048812546
-
Intrusion detection via static analysis
-
D. Wagner and D. Dean. Intrusion detection via static analysis. In IEEE S&P, 2001.
-
(2001)
IEEE S&P
-
-
Wagner, D.1
Dean, D.2
-
36
-
-
27544510809
-
Shield: Vulnerability-driven network filters for preventing known vulnerability exploits
-
H. Wang et al. Shield: Vulnerability-driven network filters for preventing known vulnerability exploits. In SIGCOMM, 2004.
-
(2004)
SIGCOMM
-
-
Wang, H.1
-
37
-
-
30344438592
-
Anomalous payload-based network intrusion detection
-
K. Wang and S. Stolfo. Anomalous payload-based network intrusion detection. In RAID, 2004.
-
(2004)
RAID
-
-
Wang, K.1
Stolfo, S.2
-
38
-
-
33745803872
-
-
J. Xu, P. Ning, C. Kil, Y. Zhai, and C. Bookholt. Automatic diagnosis and response to memory corruption vulnerabilities. In CCS, 2005.
-
J. Xu, P. Ning, C. Kil, Y. Zhai, and C. Bookholt. Automatic diagnosis and response to memory corruption vulnerabilities. In CCS, 2005.
-
-
-
-
39
-
-
20344383014
-
-
W. Xu, D. DuVarney, and R. Sekar. An efficient and backwards-compatible transformation to ensure memory safety of C programs. In FSE, 2004.
-
W. Xu, D. DuVarney, and R. Sekar. An efficient and backwards-compatible transformation to ensure memory safety of C programs. In FSE, 2004.
-
-
-
|