-
1
-
-
36349018430
-
Syscalls Obfuscation to Prevent Automatic Mimicry
-
Technical report, Dipartimento di Informatica e Comunicazione, Università degli Studi di Milano
-
D. Bruschi, L. Cavallaro, and A. Lanzi. Syscalls Obfuscation to Prevent Automatic Mimicry. Technical report, Dipartimento di Informatica e Comunicazione, Università degli Studi di Milano, 2006.
-
(2006)
-
-
Bruschi, D.1
Cavallaro, L.2
Lanzi, A.3
-
2
-
-
14944374640
-
Mitigating Buffer Overflows by Operating System Randomization
-
Technical report, CMU department of computer science
-
M. Chew and D. Song. Mitigating Buffer Overflows by Operating System Randomization. Technical report, CMU department of computer science, 2002.
-
(2002)
-
-
Chew, M.1
Song, D.2
-
3
-
-
0038825045
-
Anomaly Detection using Call Stack Information
-
H. Feng, O. Kolesnikov, P. Fogla, W. Lee, and W. Gong. Anomaly Detection using Call Stack Information. IEEE Symposium on Security and Privacy, Oakland, California, 2003.
-
(2003)
IEEE Symposium on Security and Privacy, Oakland, California
-
-
Feng, H.1
Kolesnikov, O.2
Fogla, P.3
Lee, W.4
Gong, W.5
-
4
-
-
0029716418
-
-
S. Forrest, S. A. Hofmeyr, A. Somayaji, andT. A. Longstaff. A Sense of Self for Unix Processes. In SP '96: Proceedings of the 1996 IEEE Symposium on Security and Privacy, page 120, Washington, DC, USA, 1996. IEEE Computer Society.
-
S. Forrest, S. A. Hofmeyr, A. Somayaji, andT. A. Longstaff. A Sense of Self for Unix Processes. In SP '96: Proceedings of the 1996 IEEE Symposium on Security and Privacy, page 120, Washington, DC, USA, 1996. IEEE Computer Society.
-
-
-
-
6
-
-
0032313923
-
Intrusion Detection Using Sequences of System Calls
-
S. A. Hofmeyr, S. Forrest, and A. Somayaji. Intrusion Detection Using Sequences of System Calls. Journal of Computer Security, 6(3):151-180, 1998.
-
(1998)
Journal of Computer Security
, vol.6
, Issue.3
, pp. 151-180
-
-
Hofmeyr, S.A.1
Forrest, S.2
Somayaji, A.3
-
7
-
-
85077528077
-
Automating Mimicry Attacks Using Static Binary Analysis
-
Baltimore, MD, August
-
C. Kruegel, E. Kirda, D. Mutz, W. Robertson, and G. Vigna. Automating Mimicry Attacks Using Static Binary Analysis. In Proceedings of the USENIX Security Symposium, Baltimore, MD, August 2005.
-
(2005)
Proceedings of the USENIX Security Symposium
-
-
Kruegel, C.1
Kirda, E.2
Mutz, D.3
Robertson, W.4
Vigna, G.5
-
8
-
-
36349031323
-
-
E. A. O. Levy. Smashing the Stack for Fun and Profit. Phrack Magazine, 0x07, Issue #49, Phile 14 of 16, 1998.
-
E. A. O. Levy. Smashing the Stack for Fun and Profit. Phrack Magazine, Volume 0x07, Issue #49, Phile 14 of 16, 1998.
-
-
-
-
9
-
-
0034829697
-
A Fast Automaton-Based Method for Detecting Anomalous Program Behaviors
-
R. Sekar, M. Bendre, D. Dhurjati, and P. Boliineni. A Fast Automaton-Based Method for Detecting Anomalous Program Behaviors. IEEE Symposium on Security and Privacy, Oakland, California, 2001.
-
(2001)
IEEE Symposium on Security and Privacy, Oakland, California
-
-
Sekar, R.1
Bendre, M.2
Dhurjati, D.3
Boliineni, P.4
-
11
-
-
0038011184
-
-
D. Wagner and P. Soto. Mimicry Attacks on Host Based Intrusion Detection Systems. In Proc. Ninth ACM Conference on Computer and Communications Security., 2002.
-
D. Wagner and P. Soto. Mimicry Attacks on Host Based Intrusion Detection Systems. In Proc. Ninth ACM Conference on Computer and Communications Security., 2002.
-
-
-
-
12
-
-
36349028741
-
-
R. N. Wojtczuk. The Advanced return-into-lib(c) Exploits: PaX Case Study. Phrack Magazine, 0x0b, Issue 0x3a, Phile #0x04 of 0x0e, December 2001.
-
R. N. Wojtczuk. The Advanced return-into-lib(c) Exploits: PaX Case Study. Phrack Magazine, Volume 0x0b, Issue 0x3a, Phile #0x04 of 0x0e, December 2001.
-
-
-
-
13
-
-
35048832288
-
Context Sensitive Anomaly Monitoring of Process Control Flow to Detect Mimicry Attacks and Impossible Paths
-
H. Xu, W. Du, and S. J. Chapin. Context Sensitive Anomaly Monitoring of Process Control Flow to Detect Mimicry Attacks and Impossible Paths. RAID LNCS 3224 Springer-Verlag, pages 21-38, 2004.
-
(2004)
RAID LNCS 3224 Springer-Verlag
, pp. 21-38
-
-
Xu, H.1
Du, W.2
Chapin, S.J.3
|