-
1
-
-
34547362209
-
AMD's Virtualization Solutions
-
Advanced Micro Devices, Inc, /us-en/Solutions/Consolidation/virtualization.aspx
-
Advanced Micro Devices, Inc. AMD's Virtualization Solutions, enterprise. amd.com/us-en/Solutions/Consolidation/virtualization.aspx.
-
-
-
-
3
-
-
2642545485
-
Detecting Malicious Software by Monitoring Anomalous Windows Registry Accesses
-
F. Apap, A. Honig, S. Hershkop, E. Eskin, and S. Stolfo. Detecting Malicious Software by Monitoring Anomalous Windows Registry Accesses. In Proc. of the 5th Int'l Symposium on Recent Advances in Intrusion Detection, 2002.
-
(2002)
Proc. of the 5th Int'l Symposium on Recent Advances in Intrusion Detection
-
-
Apap, F.1
Honig, A.2
Hershkop, S.3
Eskin, E.4
Stolfo, S.5
-
6
-
-
14944379887
-
-
D. R. Ellis, J. G. Aiken, K. S. Attwood, and S. D. Tenaglia. A Behavioral Approach to Worm Wetection. In Proc. of the 2004 ACM Workshop on Rapid Malcode, pages 43-53, New York, NY, USA, 2004. ACM Press.
-
D. R. Ellis, J. G. Aiken, K. S. Attwood, and S. D. Tenaglia. A Behavioral Approach to Worm Wetection. In Proc. of the 2004 ACM Workshop on Rapid Malcode, pages 43-53, New York, NY, USA, 2004. ACM Press.
-
-
-
-
8
-
-
0029716418
-
A Sense of Self for Unix Processes
-
IEEE Computer Society Press
-
S. Forrest, S. A. Hofmeyr, A. Somayaji, and T. A. Longstaff. A Sense of Self for Unix Processes. In Proc. of the 1996 IEEE Symposium on Research in Security and Privacy, pages 120-128. IEEE Computer Society Press, 1996.
-
(1996)
Proc. of the 1996 IEEE Symposium on Research in Security and Privacy
, pp. 120-128
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
Longstaff, T.A.4
-
9
-
-
34547371166
-
-
Orisoft Inc
-
Orisoft Inc. www.grisoft.com.
-
-
-
-
12
-
-
34547308731
-
-
J. Harris. YAC: Yet Another Caller ID Program. sunflowerhead.com/ software/yac/.
-
J. Harris. YAC: Yet Another Caller ID Program. sunflowerhead.com/ software/yac/.
-
-
-
-
16
-
-
0032313923
-
Intrusion Detection Using Sequences of System Calls
-
S. A. Hofmeyr, S. Forrest, and A. Somayaji. Intrusion Detection Using Sequences of System Calls. Journal of Computer Security, 6(3):151-180, 1998.
-
(1998)
Journal of Computer Security
, vol.6
, Issue.3
, pp. 151-180
-
-
Hofmeyr, S.A.1
Forrest, S.2
Somayaji, A.3
-
19
-
-
85084163246
-
Autograph: Toward Automated, Distributed Worm Signature Detection
-
H. Kim and B. Karp. Autograph: Toward Automated, Distributed Worm Signature Detection. In USENIX Security Symposium, pages 271-286, 2004.
-
(2004)
USENIX Security Symposium
, pp. 271-286
-
-
Kim, H.1
Karp, B.2
-
21
-
-
31844455702
-
Host-Based Detection of Worms through Peer-to-Peer Cooperation
-
New York, NY, USA, ACM Press
-
D. J. Malan and M. D. Smith. Host-Based Detection of Worms through Peer-to-Peer Cooperation. In Proc. of the 2005 A CM Workshop on Rapid Malcode, New York, NY, USA, 2005. ACM Press.
-
(2005)
Proc. of the 2005 A CM Workshop on Rapid Malcode
-
-
Malan, D.J.1
Smith, M.D.2
-
22
-
-
34547338308
-
-
McAfee, Inc
-
McAfee, Inc. www.mcafee.com.
-
-
-
-
23
-
-
0742276097
-
Inside the Slammer Worm
-
D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver. Inside the Slammer Worm. IEEE Security and Privacy, 1(4):33-39, 2003.
-
(2003)
IEEE Security and Privacy
, vol.1
, Issue.4
, pp. 33-39
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Staniford, S.5
Weaver, N.6
-
25
-
-
31844453661
-
Polygraph: Automatically Generating Signatures For Polymorphic Worms
-
J. Newsome, B. Karp, and D. Song. Polygraph: Automatically Generating Signatures For Polymorphic Worms. In USENIX Security Symposium, 2005.
-
(2005)
USENIX Security Symposium
-
-
Newsome, J.1
Karp, B.2
Song, D.3
-
26
-
-
34547239293
-
-
PC World Communications, Inc
-
PC World Communications, Inc. WorldBench 5. www.worldbench.com.
-
WorldBench
, vol.5
-
-
-
27
-
-
31844439615
-
Poking Around Under the Hood: A Programmer's View of Windows NT 4.0
-
August
-
M. Pietrek. Poking Around Under the Hood: A Programmer's View of Windows NT 4.0. Microsoft Systems Journal, August 1996. www.microsoft.com/msj/ archive/s413.aspx.
-
(1996)
Microsoft Systems Journal
-
-
Pietrek, M.1
-
28
-
-
34547353440
-
-
The Metasploit Project. Windows System Call Table (NT/2000/XP/2003). www.metasploit.com/users/opcode/syscalls.html.
-
The Metasploit Project. Windows System Call Table (NT/2000/XP/2003). www.metasploit.com/users/opcode/syscalls.html.
-
-
-
-
29
-
-
84878346861
-
Improving Host Security with System Call Policies
-
N. Provos. Improving Host Security with System Call Policies. In USENIX Security Symposium, pages 257-272, 2003.
-
(2003)
USENIX Security Symposium
, pp. 257-272
-
-
Provos, N.1
-
31
-
-
34547371165
-
-
P. Roberts. Mydoom Sets Speed Records. www.pcworld.com/news/article/0, aid,114461,00.asp.
-
P. Roberts. Mydoom Sets Speed Records. www.pcworld.com/news/article/0, aid,114461,00.asp.
-
-
-
-
33
-
-
34547266374
-
-
T. Sabin. Personal correspondence
-
T. Sabin. Personal correspondence.
-
-
-
-
34
-
-
31844436472
-
-
T. Sabin. Strace for NT. www.bindview.com/Services/ RAZOR/Utilities/ Windows/strace-readme.cfm.
-
Strace for NT
-
-
Sabin, T.1
-
35
-
-
34547258611
-
-
Sana Security, Inc
-
Sana Security, Inc. www.sanasecurity.com.
-
-
-
-
36
-
-
26844466732
-
Fast Detection of Scanning Worm Infections
-
French Riviera, France, September
-
S. Schechter, J. Jung, and A. W. Berger. Fast Detection of Scanning Worm Infections. In 7th Int'l Symposium on Recent Advances in Intrusion Detection, French Riviera, France, September 2004.
-
(2004)
7th Int'l Symposium on Recent Advances in Intrusion Detection
-
-
Schechter, S.1
Jung, J.2
Berger, A.W.3
-
37
-
-
84991765629
-
Automated Worm Fingerprinting
-
S. Singh, C. Estan, G. Varghese, and S. Savage. Automated Worm Fingerprinting. In OSDI, pages 45-60, 2004.
-
(2004)
OSDI
, pp. 45-60
-
-
Singh, S.1
Estan, C.2
Varghese, G.3
Savage, S.4
-
41
-
-
14944380936
-
The Top Speed of Flash Worms
-
New York, NY, USA, ACM Press
-
S. Staniford, D. Moore, V. Paxson, and N. Weaver. The Top Speed of Flash Worms. In Proc. of the 2004 ACM Workshop on Rapid Malcode, pages 33-42, New York, NY, USA, 2004. ACM Press.
-
(2004)
Proc. of the 2004 ACM Workshop on Rapid Malcode
, pp. 33-42
-
-
Staniford, S.1
Moore, D.2
Paxson, V.3
Weaver, N.4
-
43
-
-
27144475340
-
-
S. J. Stolfo, F. Apap, E. Eskin, K. Heller, S. Hershkop, A. Honig, and K. Svore. A Comparative Evaluation of Two Algorithms for Windows Registry Anomaly Detection, 13 of Journal of Computer Security, pages 659-693. 2005.
-
S. J. Stolfo, F. Apap, E. Eskin, K. Heller, S. Hershkop, A. Honig, and K. Svore. A Comparative Evaluation of Two Algorithms for Windows Registry Anomaly Detection, volume 13 of Journal of Computer Security, pages 659-693. 2005.
-
-
-
-
44
-
-
34547288903
-
-
Symantec Corporation
-
Symantec Corporation, www.symantec.com.
-
-
-
-
47
-
-
34547244678
-
-
UserLand Software, Inc. XML-RPC Home Page.
-
UserLand Software, Inc. XML-RPC Home Page. www.xmlrpc.com.
-
-
-
-
49
-
-
4243483478
-
Throttling Viruses: Restricting propagation to defeat malicious mobile code
-
Technical Report HPL-2002-172R1, HP Labs, December
-
M. M. Williamson. Throttling Viruses: Restricting propagation to defeat malicious mobile code. Technical Report HPL-2002-172R1, HP Labs, December 2002.
-
(2002)
-
-
Williamson, M.M.1
|