-
1
-
-
34548752101
-
-
November
-
Data patch for the rpc vulnerability. http://research.microsoft.com/ research/shield/papers/blasterFilter.htm, November 2006.
-
(2006)
Data patch for the rpc vulnerability
-
-
-
2
-
-
34548766373
-
-
N. Borisov, D. J. Brumley, H. J. Wang, J. Dunagan, P. Joshi, and C. Guo. A Generic Application-Level Protocol Analyzer and its Language. In Proceedings of the 14th Symposium on Network and Distributed System Security (NDSS), Feburary 2007.
-
N. Borisov, D. J. Brumley, H. J. Wang, J. Dunagan, P. Joshi, and C. Guo. A Generic Application-Level Protocol Analyzer and its Language. In Proceedings of the 14th Symposium on Network and Distributed System Security (NDSS), Feburary 2007.
-
-
-
-
3
-
-
33751056900
-
Towards Automatic Generation of Vulnerability-Based Signatures
-
May
-
D. Brumley, J. Newsome, D. Song, H. Wang, and S. Jha. Towards Automatic Generation of Vulnerability-Based Signatures. In Proceedings of the 2006 IEEE Symposium on Security and Privacy, May 2006.
-
(2006)
Proceedings of the 2006 IEEE Symposium on Security and Privacy
-
-
Brumley, D.1
Newsome, J.2
Song, D.3
Wang, H.4
Jha, S.5
-
7
-
-
48349110924
-
GQ: Realizing a System to Catch Worms in a Quarter Million Places
-
Technical Report TR-06-004, ICSI, 2006
-
W. Cui, V. Paxson, and N. Weaver. GQ: Realizing a System to Catch Worms in a Quarter Million Places. Technical Report TR-06-004, ICSI, 2006.
-
-
-
Cui, W.1
Paxson, V.2
Weaver, N.3
-
16
-
-
34247107486
-
-
G. Misherghi and Z. Su. HDD: Hierarchical Delta Debugging. In Proceedings of the 28th International Conference on Software Engineering, May 2006.
-
G. Misherghi and Z. Su. HDD: Hierarchical Delta Debugging. In Proceedings of the 28th International Conference on Software Engineering, May 2006.
-
-
-
-
17
-
-
0742276097
-
Inside the Slammer Worm
-
August
-
D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver. Inside the Slammer Worm. IEEE Magazine of Security and Privacy, August 2003.
-
(2003)
IEEE Magazine of Security and Privacy
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Staniford, S.5
Weaver, N.6
-
21
-
-
33751065981
-
Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software
-
February
-
J. Newsome and D. Song. Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software. In Proceedings of the 12 Network and Distributed System Security Symposium, February 2005.
-
(2005)
Proceedings of the 12 Network and Distributed System Security Symposium
-
-
Newsome, J.1
Song, D.2
-
22
-
-
34547396634
-
-
R. Pang, V. Paxson, R. Somer, and L. Peterson. binpac: A yace for Writing Application Protocol Parsers. In Proceedings of Internet Measurement Conference, October 2006.
-
R. Pang, V. Paxson, R. Somer, and L. Peterson. binpac: A yace for Writing Application Protocol Parsers. In Proceedings of Internet Measurement Conference, October 2006.
-
-
-
-
23
-
-
33751051489
-
Misleading Worm Signature Generators Using Deliberate Noise Injection
-
May
-
R. Perdisci, D. Dagon, W. Lee, P. Fogla, and M. Sharif. Misleading Worm Signature Generators Using Deliberate Noise Injection. In Proceedings of the 2006 IEEE Symposium on Security and Privacy, May 2006.
-
(2006)
Proceedings of the 2006 IEEE Symposium on Security and Privacy
-
-
Perdisci, R.1
Dagon, D.2
Lee, W.3
Fogla, P.4
Sharif, M.5
-
25
-
-
34548719065
-
-
The SANS Institute. The Top 20 Most Critical Internet Security Vulnerabilities - PRESS UPDATE. http://www.sans.org/top20/2005/ spring_2006_update.php, 2006.
-
The SANS Institute. The Top 20 Most Critical Internet Security Vulnerabilities - PRESS UPDATE. http://www.sans.org/top20/2005/ spring_2006_update.php, 2006.
-
-
-
-
27
-
-
84885575254
-
Scalability, Fidelity, and Containment in the Potemkin Virtual Honeyfarm
-
October
-
M. Vrable, J. Ma, J. Chen, D. Moore, E. Vandekieft, A. C. Snoeren, G. M. Voelker, and S. Savage. Scalability, Fidelity, and Containment in the Potemkin Virtual Honeyfarm. In Proceedings of the 20th ACM Symposium on Operating Systems Principles, October 2005.
-
(2005)
Proceedings of the 20th ACM Symposium on Operating Systems Principles
-
-
Vrable, M.1
Ma, J.2
Chen, J.3
Moore, D.4
Vandekieft, E.5
Snoeren, A.C.6
Voelker, G.M.7
Savage, S.8
-
28
-
-
8744281125
-
-
W32.Blaster.Worm. http://securityresponse.symantec.com/avcenter/venc/ data/w32.blaster.worm.html.
-
W32.Blaster.Worm
-
-
-
29
-
-
27544510809
-
Shield: Vulnerability-Driven Network Filters for Preventing Known Vulnerability Exploits
-
August
-
H. J. Wang, C. Guo, D. R. Simon, and A. Zugenmaier. Shield: Vulnerability-Driven Network Filters for Preventing Known Vulnerability Exploits. In Proceedings of the ACM SIGCOMM, August 2004.
-
(2004)
Proceedings of the ACM SIGCOMM
-
-
Wang, H.J.1
Guo, C.2
Simon, D.R.3
Zugenmaier, A.4
-
30
-
-
34547261222
-
Packet Vaccine: Black-box Exploit Detection and Signature Generation
-
November
-
X. Wang, Z. Li, J. Xu, M. K. Reiter, C. Kil, and J. Y. Choi. Packet Vaccine: Black-box Exploit Detection and Signature Generation. In Proceedings of the ACM Conference on Computer and Communications Security, November 2006.
-
(2006)
Proceedings of the ACM Conference on Computer and Communications Security
-
-
Wang, X.1
Li, Z.2
Xu, J.3
Reiter, M.K.4
Kil, C.5
Choi, J.Y.6
-
31
-
-
34548752101
-
-
November
-
Data Patch for the WMF Vulnerability. http://research.microsoft.com/ research/shield/papers/wmfFilter.htm, November 2006.
-
(2006)
Data Patch for the WMF Vulnerability
-
-
|