-
1
-
-
33751060454
-
-
Automatically generating malicious disks using symbolic execution. In IEEE Symposium on Security and Privacy, 2006.
-
Automatically generating malicious disks using symbolic execution. In IEEE Symposium on Security and Privacy, 2006.
-
-
-
-
3
-
-
33846012075
-
-
A. Aho, R. Sethi, and J. Ullman. Compilers:, Addison-Wesley Publishing Company
-
A. Aho, R. Sethi, and J. Ullman. Compilers: Principles, Techniques, and Tools. Addison-Wesley Publishing Company, 1986.
-
(1986)
Principles, Techniques, and Tools
-
-
-
5
-
-
33646744677
-
Wysinwyx: What you see is not what you execute
-
G. Balakrishnan, T. Reps, D. Melski, and T. Teitelbaum. Wysinwyx: What you see is not what you execute. In Proc. IFIP Working Conference on Verified Software: Theories, Tools, Experiments, 2005.
-
(2005)
Proc. IFIP Working Conference on Verified Software: Theories, Tools, Experiments
-
-
Balakrishnan, G.1
Reps, T.2
Melski, D.3
Teitelbaum, T.4
-
6
-
-
84885205652
-
Weakest-precondition of unstructured programs
-
M. Barnett and K. R. M. Leino. Weakest-precondition of unstructured programs. In PASTE, 2005.
-
(2005)
PASTE
-
-
Barnett, M.1
Leino, K.R.M.2
-
7
-
-
35048835830
-
-
C. Barrett and S. Berezin. CVC Lite: A new implementation of the cooperating validity checker. In R. Alur and D. A. Peled, editors, CAV, Lecture Notes in Computer Science. Springer, 2004.
-
C. Barrett and S. Berezin. CVC Lite: A new implementation of the cooperating validity checker. In R. Alur and D. A. Peled, editors, CAV, Lecture Notes in Computer Science. Springer, 2004.
-
-
-
-
8
-
-
35048837015
-
-
S. P. Berry. Shoki intrusion detection system, shoki. sf. net
-
S. P. Berry. Shoki intrusion detection system, shoki. sf. net.
-
-
-
-
9
-
-
33847702424
-
Bounded model checking
-
A. Biere, A. Cimatti, E. M. Clarke, O. Strichman, and Y Zhu. Bounded model checking. Advances in Computers, 2003.
-
(2003)
Advances in Computers
-
-
Biere, A.1
Cimatti, A.2
Clarke, E.M.3
Strichman, O.4
Zhu, Y.5
-
10
-
-
34548772699
-
Towards automatically identifying trigger-based behavior in malware using symbolic execution and binary analysis
-
Technical Report CMU-CS-07-105, Carnegie Mellon University School of Computer Science, January
-
D. Brumley, C. Hartwig, Z. Liang, J. Newsome, D. Song, and H. Yin. Towards automatically identifying trigger-based behavior in malware using symbolic execution and binary analysis. Technical Report CMU-CS-07-105, Carnegie Mellon University School of Computer Science, January 2007.
-
(2007)
-
-
Brumley, D.1
Hartwig, C.2
Liang, Z.3
Newsome, J.4
Song, D.5
Yin, H.6
-
11
-
-
35048903951
-
Alias analysis for assembly
-
Technical Report CMU-CS-06-180, Carnegie Mellon University School of Computer Science
-
D. Brumley and J. Newsome. Alias analysis for assembly. Technical Report CMU-CS-06-180, Carnegie Mellon University School of Computer Science, 2006.
-
(2006)
-
-
Brumley, D.1
Newsome, J.2
-
12
-
-
33751056900
-
Towards automatic generation of vulnerability-based signatures
-
D. Brumley, J. Newsome, D. Song, H. Wang, and S. Jha. Towards automatic generation of vulnerability-based signatures. In Proceedings of the IEEE Symposium on Security and Privacy, 2006.
-
(2006)
Proceedings of the IEEE Symposium on Security and Privacy
-
-
Brumley, D.1
Newsome, J.2
Song, D.3
Wang, H.4
Jha, S.5
-
13
-
-
34547241782
-
EXE: Automatically generating inputs of death. Inf roc
-
C. Cadar, V. Ganesh, P. Pawlowski, D. Dill, and D. Engler. EXE: automatically generating inputs of death. Inf roc. 13th ACM Conference on Computer and Communications Security (CCS), 2006.
-
(2006)
13th ACM Conference on Computer and Communications Security (CCS)
-
-
Cadar, C.1
Ganesh, V.2
Pawlowski, P.3
Dill, D.4
Engler, D.5
-
14
-
-
35048881888
-
-
CISCO, string matching signatures
-
CISCO. Cisco secure intrusion detection system director -string matching signatures, http://www.cisco.com/ univercd/cc/td/doc/product/iaabu/csids/ csids5/csidscog/sigs.htm#wp1015446.
-
Cisco secure intrusion detection system director
-
-
-
18
-
-
0004207324
-
Extended static checking
-
Technical Report 159, Compaq Systems Research Center, December
-
D. Detlefs, K. R. M. Leino, G. Nelson, and J. Saxe. Extended static checking. Technical Report 159, Compaq Systems Research Center, December 1998.
-
(1998)
-
-
Detlefs, D.1
Leino, K.R.M.2
Nelson, G.3
Saxe, J.4
-
20
-
-
35048897380
-
-
H. Doli. iwconfig vulnerability (wireless tools v.26). http://eve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-094 7, 2003.
-
H. Doli. iwconfig vulnerability (wireless tools v.26). http://eve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-094 7, 2003.
-
-
-
-
24
-
-
0003620778
-
-
Addison-Wesley
-
J. Hopcroft, R. Motwani, and J. Ullman. Introduction to automata theory, langauges, and computation. Addison-Wesley, 2001.
-
(2001)
Introduction to automata theory, langauges, and computation
-
-
Hopcroft, J.1
Motwani, R.2
Ullman, J.3
-
25
-
-
35048888881
-
-
A. Ireland and J. Stark, the automatic discovery of loop invariants. In Fourth NASA Langley formal methods workshop, 1997.
-
A. Ireland and J. Stark, the automatic discovery of loop invariants. In Fourth NASA Langley formal methods workshop, 1997.
-
-
-
-
28
-
-
85077528077
-
Automating mimicry attacks using static binary analysis
-
Aug
-
C. Kruegel, E. Kirda, D. Mutz, W. Robertson, and G. Vigna. Automating mimicry attacks using static binary analysis. In Proceedings of the 14th USENIX Security Symposium, Aug. 2005.
-
(2005)
Proceedings of the 14th USENIX Security Symposium
-
-
Kruegel, C.1
Kirda, E.2
Mutz, D.3
Robertson, W.4
Vigna, G.5
-
29
-
-
13844267476
-
Efficient weakest preconditions
-
K. R. M. Leino. Efficient weakest preconditions. Information Processing Letters, 93(6):281-288, 2005.
-
(2005)
Information Processing Letters
, vol.93
, Issue.6
, pp. 281-288
-
-
Leino, K.R.M.1
-
38
-
-
35048865242
-
-
L. I. on Demand. K rustan leino and francesco logozzo. In The Third Asian Symposium on Programming Languages and Systems, 2005.
-
L. I. on Demand. K rustan leino and francesco logozzo. In The Third Asian Symposium on Programming Languages and Systems, 2005.
-
-
-
-
39
-
-
35048880876
-
-
V. Paxson. Bro: A. system, for detecting network intruders in real-time, computer networks, 31, December 1999.
-
V. Paxson. Bro: A. system, for detecting network intruders in real-time, computer networks, 31, December 1999.
-
-
-
-
40
-
-
33751051489
-
Misleading worm signature generators using deliberate noise injection
-
R. Perdisci, D. Dagon, W. Lee, P. Fogla, and M. Sharif. Misleading worm signature generators using deliberate noise injection. In IEEE Symposium on Security and Privacy, 2006.
-
(2006)
IEEE Symposium on Security and Privacy
-
-
Perdisci, R.1
Dagon, D.2
Lee, W.3
Fogla, P.4
Sharif, M.5
-
41
-
-
35048862260
-
-
r-code. ATPhttpd exploit. http://www.cotse.com/mailing-lists/todays/att- 0003/01-atphttp0x06.c.
-
r-code. ATPhttpd exploit. http://www.cotse.com/mailing-lists/todays/att- 0003/01-atphttp0x06.c.
-
-
-
-
43
-
-
84991765629
-
Automated worm, fingerprinting
-
Dec
-
S. Singh, C. Estan, G. Varghese, and S. Savage. Automated worm, fingerprinting. In Proceedings of the 6th ACM/USENIX Symposium on Operating System Design and Implementation (OSDI), Dec. 2004.
-
(2004)
Proceedings of the 6th ACM/USENIX Symposium on Operating System Design and Implementation (OSDI)
-
-
Singh, S.1
Estan, C.2
Varghese, G.3
Savage, S.4
-
44
-
-
12844267418
-
Secure program execution via dynamic information flow tracking
-
G. E. Suh, J. Lee, and S. Devadas. Secure program execution via dynamic information flow tracking. In Proceedings of ASPLOS, 2004.
-
(2004)
Proceedings of ASPLOS
-
-
Suh, G.E.1
Lee, J.2
Devadas, S.3
-
46
-
-
35048839154
-
-
K. Takeda. Pakemon intrusion detection system, http://www.inas.mag.keio. ac.jp/ids/pakemon/index.html. referenced by http://www.whit.ehats.com/ids/.
-
K. Takeda. Pakemon intrusion detection system, http://www.inas.mag.keio. ac.jp/ids/pakemon/index.html. referenced by http://www.whit.ehats.com/ids/.
-
-
-
-
48
-
-
35048850818
-
-
US-CERT. Vulnerability note vu#196945 - isc bind 8 contains buffer overflow in transaction signature (tsig) handling code, http://www.kb.cert.org/ vuls/id/196945.
-
US-CERT. Vulnerability note vu#196945 - isc bind 8 contains buffer overflow in transaction signature (tsig) handling code, http://www.kb.cert.org/ vuls/id/196945.
-
-
-
-
49
-
-
27544510809
-
Shield: Vulnerability-driven network, filters for preventing known vulnerability exploits
-
August
-
H. J. Wang, C. Guo, D. Simon, and. A. Zugenmaier. Shield: Vulnerability-driven network, filters for preventing known vulnerability exploits. In Proceedings of the 2004 ACM SIGCOMM Conference, August 2004.
-
(2004)
Proceedings of the 2004 ACM SIGCOMM Conference
-
-
Wang, H.J.1
Guo, C.2
Simon, D.3
Zugenmaier, A.4
|