-
1
-
-
33947623904
-
-
SANS Institute
-
SANS Institute: Lion worm. http://www.sans.com/y2k/lion.htm.
-
Lion worm
-
-
-
2
-
-
33947675542
-
-
June
-
SARS Worms, http://www.xfocus.net/tools/200306/413.html, June 2003.
-
(2003)
-
-
Worms, S.A.R.S.1
-
3
-
-
0036709428
-
Recovery from Malicious Transactions
-
P. Ammann, S. Jajodia, and P. Liu. Recovery from Malicious Transactions. IEEE TKDE, Volume 14, Issue. 5, 2002.
-
(2002)
IEEE TKDE
, vol.14
, Issue.5
-
-
Ammann, P.1
Jajodia, S.2
Liu, P.3
-
6
-
-
85084160792
-
Understanding Data Lifetime via Whole System Simulation
-
Aug
-
J. Chow, B. Pfaff, T. Garfinkel, K. Christopher, and M. Rosenblum. Understanding Data Lifetime via Whole System Simulation. USENIX Security Symp., Aug. 2004.
-
(2004)
USENIX Security Symp
-
-
Chow, J.1
Pfaff, B.2
Garfinkel, T.3
Christopher, K.4
Rosenblum, M.5
-
10
-
-
4444265683
-
Xen and the Art of Virtualization
-
Oct
-
B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, I. Pratt, A. Warfield, P. Barham, and R. Neugebauer. Xen and the Art of Virtualization. ACM SOSP 2003, Oct. 2003.
-
(2003)
ACM SOSP 2003
-
-
Dragovic, B.1
Fraser, K.2
Hand, S.3
Harris, T.4
Ho, A.5
Pratt, I.6
Warfield, A.7
Barham, P.8
Neugebauer, R.9
-
11
-
-
11844249640
-
ReVirt: Enabling Intrusion Analysis Through Virtual-Machine Logging and Replay
-
Dec
-
G. W. Dunlap, S. T. King, S. Cinar, M. A. Basrai, and P. M. Chen. ReVirt: Enabling Intrusion Analysis Through Virtual-Machine Logging and Replay. USENIX OSDI, Dec. 2002.
-
(2002)
USENIX OSDI
-
-
Dunlap, G.W.1
King, S.T.2
Cinar, S.3
Basrai, M.A.4
Chen, P.M.5
-
12
-
-
0042078549
-
-
E. N. Elnozahy, L. Alvisi, Y.-M. Wang, and D. B. Johnson. A Survey of Rollback-Recovery Protocols in Message Passing Systems. ACM Computing Survey, 34(3), 2002.
-
E. N. Elnozahy, L. Alvisi, Y.-M. Wang, and D. B. Johnson. A Survey of Rollback-Recovery Protocols in Message Passing Systems. ACM Computing Survey, 34(3), 2002.
-
-
-
-
13
-
-
85080362568
-
A Virtual Machine Introspection Based Architecture for Intrusion Detection
-
Feb
-
T. Garfinkel and M. Rosenblum. A Virtual Machine Introspection Based Architecture for Intrusion Detection NDSS 2003, Feb. 2003.
-
(2003)
NDSS 2003
-
-
Garfinkel, T.1
Rosenblum, M.2
-
14
-
-
33947629948
-
CERIAS Technical Report 2005-81, Purdue University
-
X. Jiang, A. Walters, F. Buchholz, D. Xu, Y. Wang, and E. Spafford. Provenance-Aware Tracing of Worm Break-in and Contaminations: A Process Coloring Approach. CERIAS Technical Report 2005-81, Purdue University, 2005.
-
(2005)
-
-
Jiang, X.1
Walters, A.2
Buchholz, F.3
Xu, D.4
Wang, Y.5
Spafford, E.6
-
19
-
-
79953672829
-
Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software
-
Feb
-
J. Newsome and D. Song. Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software. NDSS 2005, Feb. 2005.
-
(2005)
NDSS 2005
-
-
Newsome, J.1
Song, D.2
-
22
-
-
84878346861
-
Improving Host Security with System Call Policies
-
Aug
-
N. Provos. Improving Host Security with System Call Policies. USENIX Security Symp., Aug. 2003.
-
(2003)
USENIX Security Symp
-
-
Provos, N.1
-
23
-
-
33748537883
-
Pioneer: Verifying Integrity and Guaranteeing Execution of Code on Legacy Platforms
-
Oct
-
A. Seshadri, M. Luk, E. Shi, A. Perrig, L. van Doom, and P. Khosla. Pioneer: Verifying Integrity and Guaranteeing Execution of Code on Legacy Platforms. ACM SOSP 2005, Oct. 2005.
-
(2005)
ACM SOSP 2005
-
-
Seshadri, A.1
Luk, M.2
Shi, E.3
Perrig, A.4
van Doom, L.5
Khosla, P.6
-
24
-
-
84896257180
-
MOVE: An End-to-End Solution To Network Denial of Service
-
Feb
-
A. Stavrou, A. D. Keromytis, J. Nieh, V. Misra, and D. Rubenstein. MOVE: An End-to-End Solution To Network Denial of Service. NDSS 2005, Feb. 2005.
-
(2005)
NDSS 2005
-
-
Stavrou, A.1
Keromytis, A.D.2
Nieh, J.3
Misra, V.4
Rubenstein, D.5
-
25
-
-
0038011184
-
Mimicry Attacks on Host-Based Intrusion Detection Systems
-
Nov
-
D. Wagner and P. Soto. Mimicry Attacks on Host-Based Intrusion Detection Systems. ACM CCS 2002, Nov. 2002.
-
(2002)
ACM CCS 2002
-
-
Wagner, D.1
Soto, P.2
-
26
-
-
33751063484
-
Configuration Debugging as Search: Finding the Needle in the Haystack
-
Dec
-
A. Whitaker, R. S. Cox, and S. D. Gribble. Configuration Debugging as Search: Finding the Needle in the Haystack. USENIX OSDI 2004, Dec. 2004.
-
(2004)
USENIX OSDI 2004
-
-
Whitaker, A.1
Cox, R.S.2
Gribble, S.D.3
-
27
-
-
49449113941
-
Design, Implementation and Evaluation of Repairable File Service
-
June
-
N. Zhu and T. Chiueh. Design, Implementation and Evaluation of Repairable File Service. IEEE DSN 2003, June 2003.
-
(2003)
IEEE DSN 2003
-
-
Zhu, N.1
Chiueh, T.2
|