-
2
-
-
0023294949
-
Computer Viruses: Theory and Experiments
-
Cohen, F.: Computer Viruses: Theory and Experiments. Computers and Security 6 (1987) 22-35
-
(1987)
Computers and Security
, vol.6
, pp. 22-35
-
-
Cohen, F.1
-
7
-
-
0034838197
-
Data Mining Methods for Detection of New Malicious Executables
-
Oakland, California
-
Schultz, M.G., Eskin, E., Zadok, E., Stolfo, S.J.: Data Mining Methods for Detection of New Malicious Executables. In: Proceedings of the 2001 IEEE Symposium on Security and Privacy, Oakland, California (2001) 38-49
-
(2001)
Proceedings of the 2001 IEEE Symposium on Security and Privacy
, pp. 38-49
-
-
Schultz, M.G.1
Eskin, E.2
Zadok, E.3
Stolfo, S.J.4
-
8
-
-
15944375379
-
MEF: Malicious Email Filter - A UNIX Mail Filter that Detects Malicious Windows Executables
-
FREENIX Track, Boston, Massechusetts
-
Schultz, M.G., Eskin, E., Zadok, E., Bhattacharyya, M., Stolfo, S.J.: MEF: Malicious Email Filter - A UNIX Mail Filter that Detects Malicious Windows Executables. In: Proceedings of the Annual USENIX Technical Conference, FREENIX Track, Boston, Massechusetts (2001) 245-252
-
(2001)
Proceedings of the Annual USENIX Technical Conference
, pp. 245-252
-
-
Schultz, M.G.1
Eskin, E.2
Zadok, E.3
Bhattacharyya, M.4
Stolfo, S.J.5
-
9
-
-
0030092390
-
Checking for Race Conditions in File Accesses
-
Bishop, M., Dilger, M.: Checking for Race Conditions in File Accesses. Computing Systems 9 (1996) 131-152
-
(1996)
Computing Systems
, vol.9
, pp. 131-152
-
-
Bishop, M.1
Dilger, M.2
-
10
-
-
0030216542
-
Neural Networks for Computer Virus Recognition
-
Tesauro, G., Kephart, J., Sorkin, G.: Neural Networks for Computer Virus Recognition. IEEE Expert 11 (1996) 5-6
-
(1996)
IEEE Expert
, vol.11
, pp. 5-6
-
-
Tesauro, G.1
Kephart, J.2
Sorkin, G.3
-
11
-
-
0029488806
-
MCF: A Malicious Code Filter
-
Lo, R.W., Levitt, K.N., Olsson, R.A.: MCF: A Malicious Code Filter. Computers and Security 14 (1995) 541-566
-
(1995)
Computers and Security
, vol.14
, pp. 541-566
-
-
Lo, R.W.1
Levitt, K.N.2
Olsson, R.A.3
-
12
-
-
0004200684
-
Computer Security Technology Planning Study
-
ESD-TR-73-51, U.S. Air Force Electronic Systems Division, Deputy for Command and Management Systems, HQ Electronic Systems Division (AFSC), Bedford, Massachusetts
-
Anderson, J.P.: Computer Security Technology Planning Study. Technical report, ESD-TR-73-51, U.S. Air Force Electronic Systems Division, Deputy for Command and Management Systems, HQ Electronic Systems Division (AFSC), Bedford, Massachusetts (1972)
-
(1972)
Technical Report
-
-
Anderson, J.P.1
-
14
-
-
3543139162
-
Computability Classes for Enforcement Mechanisms
-
Cornell University, Dept. of Computer Science
-
Hamlen, K.W., Morrisett, G., Schneider, F.B.: Computability Classes for Enforcement Mechanisms. Technical report, TR 2003-1908, Cornell University, Dept. of Computer Science (2003)
-
(2003)
Technical Report
, vol.TR 2003-1908
-
-
Hamlen, K.W.1
Morrisett, G.2
Schneider, F.B.3
-
15
-
-
14844332191
-
More Enforceable Security Policies
-
Copenhagen, Denmark
-
Bauer, L., Ligatti, J., Walker, D.: More Enforceable Security Policies. In: Foundations of Computer Security, Copenhagen, Denmark (2002)
-
(2002)
Foundations of Computer Security
-
-
Bauer, L.1
Ligatti, J.2
Walker, D.3
-
16
-
-
85084161168
-
TRON: Process-Specific File Protection for the UNIX Operating System
-
New Orleans, Lousianna
-
Berman, A., Bourassa, V., Selberg, E.: TRON: Process-Specific File Protection for the UNIX Operating System. In: Proceedings of the 1995 Annual USENIX Technical Conference, New Orleans, Lousianna (1995) 165-175
-
(1995)
Proceedings of the 1995 Annual USENIX Technical Conference
, pp. 165-175
-
-
Berman, A.1
Bourassa, V.2
Selberg, E.3
-
17
-
-
85084162735
-
A Secure Environment for Untrusted Helper Applications
-
San Jose, California
-
Goldberg, I., Wagner, D., Thomas, R., Brewer, E.A.: A Secure Environment for Untrusted Helper Applications. In: Proceedings of the 6th USENIX Security Symposium, San Jose, California (1996)
-
(1996)
Proceedings of the 6th USENIX Security Symposium
-
-
Goldberg, I.1
Wagner, D.2
Thomas, R.3
Brewer, E.A.4
-
18
-
-
35048888212
-
Consh: A Confined Execution Environment for Internet Computations
-
New Orleans, Louisianna
-
Alexandrov, A., Kmiec, P., Schauser, K.: Consh: A Confined Execution Environment for Internet Computations. In: Proceedinges of the Annual USENIX Technical Conference, New Orleans, Louisianna (1998)
-
(1998)
Proceedinges of the Annual USENIX Technical Conference
-
-
Alexandrov, A.1
Kmiec, P.2
Schauser, K.3
-
19
-
-
85084161234
-
MAPbox: Using Parameterized Behavior Classes to Confine Untrusted Application
-
Denver, Colorado
-
Acharya, A., Raje, M.: MAPbox: Using Parameterized Behavior Classes to Confine Untrusted Application. In: Proceedings of the 9th USENIX Security Symposium, Denver, Colorado (2000)
-
(2000)
Proceedings of the 9th USENIX Security Symposium
-
-
Acharya, A.1
Raje, M.2
-
20
-
-
10044275460
-
Subdomain: Parsimonious Server Security
-
New Orleans, Louisianna
-
Cowan, C., Beattie, S., Kroah-Hartman, G., Pu, C., Wagle, P., Gligor, V.: Subdomain: Parsimonious Server Security. In: Proceedings of the 14th Systems Administration Conference, New Orleans, Louisianna (2000)
-
(2000)
Proceedings of the 14th Systems Administration Conference
-
-
Cowan, C.1
Beattie, S.2
Kroah-Hartman, G.3
Pu, C.4
Wagle, P.5
Gligor, V.6
-
21
-
-
84878346861
-
Improving Host Security with System Call Policies
-
Washington, DC
-
Provos, N.: Improving Host Security with System Call Policies. In: Proceedings of the 12th USENIX Security Symposium, Washington, DC (2003) 257-272
-
(2003)
Proceedings of the 12th USENIX Security Symposium
, pp. 257-272
-
-
Provos, N.1
-
23
-
-
35048861569
-
-
The Honeynet Project
-
The Honeynet Project: http://project.honeynet.org/.
-
-
-
-
25
-
-
85084164812
-
Collapsar: A VM-Based Architecture for Network Attack Detention Center
-
San Diego, California
-
Jiang, X., Xu, D.: Collapsar: A VM-Based Architecture for Network Attack Detention Center. In: Proceedings of the 13th USENIX Security Symposium, San Diego, California (2004)
-
(2004)
Proceedings of the 13th USENIX Security Symposium
-
-
Jiang, X.1
Xu, D.2
-
29
-
-
35048860579
-
-
Next Generation Intrusion Prevention System
-
LaBrea Sentry IPS: Next Generation Intrusion Prevention System: http://www.labreatechnologies.com/.
-
-
-
Labrea Sentry, I.P.S.1
-
33
-
-
0004048154
-
Computer Security Threat Monitoring and Surveillance
-
James P. Anderson Company, Fort Washington, Pennsylvania
-
Anderson, J.P.: Computer Security Threat Monitoring and Surveillance. Technical report, James P. Anderson Company, Fort Washington, Pennsylvania (1980)
-
(1980)
Technical Report
-
-
Anderson, J.P.1
-
35
-
-
84873309550
-
Penetration State Transition Analysis - A Rule-Based Intrusion Detection Approach
-
San Antonio, Texas
-
Porras, P.A., Kemmerer, R.A.: Penetration State Transition Analysis - A Rule-Based Intrusion Detection Approach. In: 8th Annual Computer Security Applications Conference, San Antonio, Texas (1992) 220-229
-
(1992)
8th Annual Computer Security Applications Conference
, pp. 220-229
-
-
Porras, P.A.1
Kemmerer, R.A.2
-
38
-
-
0004118981
-
The NIDES Statistical Component: Description and Justification
-
SRI International, Computer Science Laboratory, Menlo Park, California
-
Javitz, H.S., Valdes, A.: The NIDES Statistical Component: Description and Justification. Technical report, SRI International, Computer Science Laboratory, Menlo Park, California (1993)
-
(1993)
Technical Report
-
-
Javitz, H.S.1
Valdes, A.2
-
39
-
-
0242667960
-
Detecting Unusual Program Behavior Using the Statistical Components of NIDES
-
SRI-CSL-95-06, SRI International, Computer Science Laboratory, Menlo Park, California
-
Anderson, D., Lunt, T.F., Javitz, H., Tamaru, A., Valdes, A.: Detecting Unusual Program Behavior Using the Statistical Components of NIDES. Technical report, SRI-CSL-95-06, SRI International, Computer Science Laboratory, Menlo Park, California (1995)
-
(1995)
Technical Report
-
-
Anderson, D.1
Lunt, T.F.2
Javitz, H.3
Tamaru, A.4
Valdes, A.5
-
42
-
-
85084162795
-
Detecting Manipulated Remote Call Streams
-
San Francisco, California
-
Giffin, J.T., Jha, S-, Miller, B.P.: Detecting Manipulated Remote Call Streams. In: Proceedings of the 11th USENIX Security Symposium, San Francisco, California (2002)
-
(2002)
Proceedings of the 11th USENIX Security Symposium
-
-
Giffin, J.T.1
Jha, S.2
Miller, B.P.3
-
44
-
-
35048850623
-
Locality: A New Paradigm for Thinking about Normal Behavior and Outsider Threat
-
Ascona, Switzerland
-
McHugh, J., Gates, C.: Locality: A New Paradigm for Thinking about Normal Behavior and Outsider Threat. In: Proceedings of the ACM New Security Paradigms Workshop, Ascona, Switzerland (2003)
-
(2003)
Proceedings of the ACM New Security Paradigms Workshop
-
-
McHugh, J.1
Gates, C.2
-
45
-
-
85180753454
-
User-Level Infrastructure for System Call Interposition: A Platform for Intrusion Detection and Confinement
-
San Diego, California
-
Jain, K., Sekar, R.: User-Level Infrastructure for System Call Interposition: A Platform for Intrusion Detection and Confinement. In: Proceedings of the Network and Distributed System Security Symposium, San Diego, California (2000) 19-34
-
(2000)
Proceedings of the Network and Distributed System Security Symposium
, pp. 19-34
-
-
Jain, K.1
Sekar, R.2
-
46
-
-
0003246945
-
SLIC: An Extensibility System for Commodity Operating Systems
-
New Orleans, Louisianna
-
Ghormley, D.P., Petrou, D., Rodrigues, S.H., Anderson, T.E.: SLIC: An Extensibility System for Commodity Operating Systems. In: Proceedinges of the Annual USENIX Technical Conference, New Orleans, Louisianna (1998) 39-52
-
(1998)
Proceedinges of the Annual USENIX Technical Conference
, pp. 39-52
-
-
Ghormley, D.P.1
Petrou, D.2
Rodrigues, S.H.3
Anderson, T.E.4
-
47
-
-
0032641892
-
Hardening COTS Software with Generic Software Wrappers
-
Oakland, California
-
Fraser, T., Badger, L., Feldman, M.: Hardening COTS Software with Generic Software Wrappers. In: Proceedings of the IEEE Symposium on Security and Privacy, Oakland, California (1999) 2-16
-
(1999)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 2-16
-
-
Fraser, T.1
Badger, L.2
Feldman, M.3
-
48
-
-
85084160041
-
Detecting and Countering System Intrusions Using Software Wrappers
-
Denver, Colorado
-
Ko, C., Fraser, T., Badger, L., Kilpatrick, D.: Detecting and Countering System Intrusions Using Software Wrappers. In: Proceedings of the 9th USENIX Security Symposium, Denver, Colorado (2000)
-
(2000)
Proceedings of the 9th USENIX Security Symposium
-
-
Ko, C.1
Fraser, T.2
Badger, L.3
Kilpatrick, D.4
-
52
-
-
0000494607
-
State Restoration in Systems of Communicating Processes
-
Russell, D.L.: State Restoration in Systems of Communicating Processes. IEEE Transactions on Software Engineering SE6 (1980) 133-144
-
(1980)
IEEE Transactions on Software Engineering
, vol.SE6
, pp. 133-144
-
-
Russell, D.L.1
-
53
-
-
20544453142
-
-
W32.bugbear@mm.
-
Liu, Y., Sevcenco, S.: W32.bugbear@mm. Symantec Security Response (2003) http://securityresponse.symantec.com/avcenter/venc/data/ w32.bugbear@mm.html.
-
(2003)
Symantec Security Response
-
-
Liu, Y.1
Sevcenco, S.2
-
54
-
-
84860097162
-
-
Vbs.haptime.a@mm.
-
Sevcenco, S.: Vbs.haptime.a@mm. Symantec Security Response (2004) http://securityresponse.symantec.com/avcenter/venc/data/ vbs.haptime.a@mm.html.
-
(2004)
Symantec Security Response
-
-
Sevcenco, S.1
-
56
-
-
84860097162
-
-
W32.mydoom.a@mm.
-
Ferrie, P., Lee, T.: W32.mydoom.a@mm. Symantec Security Response (2004) http://securityresponse.symantec.com/avcenter/venc/data/ w32.novarg.a@mm.html.
-
(2004)
Symantec Security Response
-
-
Ferrie, P.1
Lee, T.2
|