-
1
-
-
85077528077
-
Automating mimicry attacks using static binary analysis
-
C. Kruegel, E. Kirda, D. Mutz, W. Robertson, and G. Vigna, Automating mimicry attacks using static binary analysis, Proceedings of the USENIX Security Symposium, pp. 161-176, 2003.
-
(2003)
Proceedings of the USENIX Security Symposium
, pp. 161-176
-
-
Kruegel, C.1
Kirda, E.2
Mutz, D.3
Robertson, W.4
Vigna, G.5
-
2
-
-
34548776844
-
-
Last accessed May 2006
-
Stide, http://www.cs.unm.edu/~immsec/data-sets.htm, Last accessed May 2006.
-
Stide
-
-
-
3
-
-
14844322335
-
Testing Network Based Intrusion Deteotion Signatures Using Mutant Exploits
-
Vigna, G., Robertson, W., Balzarotti D., Testing Network Based Intrusion Deteotion Signatures Using Mutant Exploits, ACM Conference on Computer Security, pp. 21-30, 2004.
-
(2004)
ACM Conference on Computer Security
, pp. 21-30
-
-
Vigna, G.1
Robertson, W.2
Balzarotti, D.3
-
4
-
-
0004145058
-
Insertion, Evasion and Denial of Service: Eluding Network Intrusion Detection
-
Technical Report, Secure Networks, January 1998
-
T. H. Ptacek and T. N. Newsham, Insertion, Evasion and Denial of Service: Eluding Network Intrusion Detection. Technical Report, Secure Networks, January 1998.
-
-
-
Ptacek, T.H.1
Newsham, T.N.2
-
5
-
-
33751054751
-
Evolving Successful Stack Overflow Attacks for Vulnerability Testing
-
H. G. Kayacik, A. N. Zincir-Heywood, M. I. Heywood, Evolving Successful Stack Overflow Attacks for Vulnerability Testing, 21st Annual Computer Security Applications Conference, pp. 225-234, 2005.
-
(2005)
21st Annual Computer Security Applications Conference
, pp. 225-234
-
-
Kayacik, H.G.1
Zincir-Heywood, A.N.2
Heywood, M.I.3
-
6
-
-
33750273860
-
On Evolving Buffer Overflow Attacks using Genetic Programming
-
H. G. Kayacik, M. I. Heywood, A. N. Zincir-Heywood. On Evolving Buffer Overflow Attacks using Genetic Programming. Proceedings of the Genetic and Evolutionary Computation Conference, (GECCO'06). SIG EVO, ACM Press, pp. 1667-1673, 2006.
-
(2006)
Proceedings of the Genetic and Evolutionary Computation Conference, (GECCO'06). SIG EVO, ACM Press
, pp. 1667-1673
-
-
Kayacik, H.G.1
Heywood, M.I.2
Zincir-Heywood, A.N.3
-
8
-
-
84958984156
-
Undermining an Anomaly-based Intrusion Detection System using Common Exploits, RAID'2002
-
Tan, K. M. C., Killourhy, K. S., Maxion, R. A., Undermining an Anomaly-based Intrusion Detection System using Common Exploits, RAID'2002, LNCS 2516, pp 54-73, 2002.
-
(2002)
LNCS
, vol.2516
, pp. 54-73
-
-
Tan, K.M.C.1
Killourhy, K.S.2
Maxion, R.A.3
-
9
-
-
4544230873
-
Hiding Intrusions: From the Abnormal to the Normal and Beyond
-
K. M. C. Tan, J. McHugh, K. S. Killourhy, Hiding Intrusions: From the Abnormal to the Normal and Beyond, Symposium on Information Hiding, pp. 1-17, 2002.
-
(2002)
Symposium on Information Hiding
, pp. 1-17
-
-
Tan, K.M.C.1
McHugh, J.2
Killourhy, K.S.3
-
10
-
-
33745201000
-
Anomalous: System Call Detection
-
Feb
-
D. Mutz, E. Valeur, G. Vigna, C. Kruegel, Anomalous: System Call Detection, ACM Transactions on Information system and Security, 9(1), pp. 61-93, Feb 2006.
-
(2006)
ACM Transactions on Information system and Security
, vol.9
, Issue.1
, pp. 61-93
-
-
Mutz, D.1
Valeur, E.2
Vigna, G.3
Kruegel, C.4
-
11
-
-
0029716418
-
A sense of self for unix processes
-
S. Forrest, S. A. Hofmeyr, A. Somayaji, and T.A. Longstaff A sense of self for unix processes. In Proceedings of the IEEE Symposium on Security and Privacy, pp. 120-128, 1996.
-
(1996)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 120-128
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
Longstaff, T.A.4
-
13
-
-
0038825045
-
Anomaly detection using call stack information
-
H. Feng, O. Kplesnikoy, P. Fogla, W. Lee, and W. Gong, Anomaly detection using call stack information, IEEE Symposium on Security and Privacy, pp. 62-75, 2003.
-
(2003)
IEEE Symposium on Security and Privacy
, pp. 62-75
-
-
Feng, H.1
Kplesnikoy, O.2
Fogla, P.3
Lee, W.4
Gong, W.5
-
15
-
-
84944248021
-
Intrusion Detection Using Variable-Length Audit Trail Patterns, RAID'2000
-
Wespi, A., Dacier, M., and Debar, H., Intrusion Detection Using Variable-Length Audit Trail Patterns, RAID'2000, LNCS 1907, pp. 110-129, 2000.
-
(2000)
LNCS 1907
, pp. 110-129
-
-
Wespi, A.1
Dacier, M.2
Debar, H.3
-
17
-
-
34548735861
-
-
Released, Last accessed May
-
Securiteam, Linux Traceroute Exploit Code Released, http://www. securiteam.com/exploits/6A00AIF5OM.htm, Last accessed May 2006.
-
(2006)
Linux Traceroute Exploit Code
-
-
Securiteam1
-
18
-
-
0036608308
-
Dynamic Page Based Crossover in Linear Genetic Programming
-
M. I. Heywood, A. N. Zincir-Heywood, Dynamic Page Based Crossover in Linear Genetic Programming, IEEE Transactions on Systems, Man and Cybernetics - Part B, 32(3), pp 360-388, 2002.
-
(2002)
IEEE Transactions on Systems, Man and Cybernetics - Part B
, vol.32
, Issue.3
, pp. 360-388
-
-
Heywood, M.I.1
Zincir-Heywood, A.N.2
|