-
3
-
-
33751056900
-
Towards Automatic Generation of Vulnerability-Based Signatures
-
May
-
BRUMLEY, D., NEWSOME, J., SONG, D., WANG, H., AND JHA, S. Towards Automatic Generation of Vulnerability-Based Signatures. In Proceedings of the IEEE Symposium on Security and Privacy (May 2006).
-
(2006)
Proceedings of the IEEE Symposium on Security and Privacy
-
-
BRUMLEY, D.1
NEWSOME, J.2
SONG, D.3
WANG, H.4
JHA, S.5
-
4
-
-
33745647290
-
-
th International Symposium on Recent Advances in Intrusion Detection (RAID) (September 2005), pp. 284-304.
-
th International Symposium on Recent Advances in Intrusion Detection (RAID) (September 2005), pp. 284-304.
-
-
-
-
5
-
-
84885679117
-
Vigilante: End-to-End Containment of Internet Worms
-
October
-
COSTA, M., CROWCROFT, J., CASTRO, M., AND ROWSTRON, A. Vigilante: End-to-End Containment of Internet Worms. In Proceedings of the Symposium on Systems and Operating Systems Principles (SOSP) (October 2005).
-
(2005)
Proceedings of the Symposium on Systems and Operating Systems Principles (SOSP)
-
-
COSTA, M.1
CROWCROFT, J.2
CASTRO, M.3
ROWSTRON, A.4
-
7
-
-
84858481533
-
The Botnet Trackers
-
February
-
DAGON, D. The Botnet Trackers. Washington Post (February 2006). http ://www.washingtonpost.com/wp-dyn/content/article/2006/02/16/ AR20060%21601388.html.
-
(2006)
Washington Post
-
-
DAGON, D.1
-
10
-
-
36949029349
-
-
IANELLI, N., AND HACKWORTH, A. Botnets as a Vehicle for Online Crime. http ://www.cert.org/archive/pdf/Botnets.pdf, December 2005.
-
IANELLI, N., AND HACKWORTH, A. Botnets as a Vehicle for Online Crime. http ://www.cert.org/archive/pdf/Botnets.pdf, December 2005.
-
-
-
-
12
-
-
33751032041
-
Sub Virt: Implementing Malware with Virtual Machines
-
May
-
KING, S. T., CHEN, P. M., WANG, Y.-M., VERBOWSKI, C., WANG, H. J., AND LORCH, J. R. Sub Virt: Implementing Malware with Virtual Machines. In Proceedings of the IEEE Symposium on Security and Privacy (May 2006).
-
(2006)
Proceedings of the IEEE Symposium on Security and Privacy
-
-
KING, S.T.1
CHEN, P.M.2
WANG, Y.-M.3
VERBOWSKI, C.4
WANG, H.J.5
LORCH, J.R.6
-
17
-
-
85084159849
-
Privacy-Preserving Sharing and Correlation of Security Alerts
-
LINCOLN, P., PORRAS, P. A., AND SHMATIKOV, V. Privacy-Preserving Sharing and Correlation of Security Alerts. In Proceedings of the USENIX Security Symposium (2004), pp. 239-254.
-
(2004)
Proceedings of the USENIX Security Symposium
, pp. 239-254
-
-
LINCOLN, P.1
PORRAS, P.A.2
SHMATIKOV, V.3
-
19
-
-
36949034044
-
Quantifying Application Behavior Space for Detection and Self-Healing
-
Tech. Rep. CUCS-017-06, Columbia University
-
LOCASTO, M. E., STAVROU, A., CRETU, G. F., STOLFO, S. J., AND KEROMYTIS, A. D. Quantifying Application Behavior Space for Detection and Self-Healing. Tech. Rep. CUCS-017-06, Columbia University, 2006.
-
(2006)
-
-
LOCASTO, M.E.1
STAVROU, A.2
CRETU, G.F.3
STOLFO, S.J.4
KEROMYTIS, A.D.5
-
21
-
-
0042474173
-
Internet Quarantine: Requirements for Containing Self-Propagating Code
-
April
-
MOORE, D., SHANNON, C., VOELKER, G., AND SAVAGE, S. Internet Quarantine: Requirements for Containing Self-Propagating Code. In Proceedings of the IEEE Infocom Conference (April 2003).
-
(2003)
Proceedings of the IEEE Infocom Conference
-
-
MOORE, D.1
SHANNON, C.2
VOELKER, G.3
SAVAGE, S.4
-
22
-
-
16244366310
-
-
NETHERCOTE, N., AND SEWARD, J. Valgrind: A Program Supervision Framework. In Electronic Notes in Theoretical Computer Science (2003), 89.
-
NETHERCOTE, N., AND SEWARD, J. Valgrind: A Program Supervision Framework. In Electronic Notes in Theoretical Computer Science (2003), vol. 89.
-
-
-
-
23
-
-
36949037927
-
-
NEWSOME, J., BRUMLEY, D., AND SONG, D. Vulnerability-Specific Execution Filtering for Exploit Prevention on Commodity Software. In Proceedings of the 13 Symposium on Network and Distributed System Security (NDSS) (February 2006).
-
NEWSOME, J., BRUMLEY, D., AND SONG, D. Vulnerability-Specific Execution Filtering for Exploit Prevention on Commodity Software. In Proceedings of the 13 Symposium on Network and Distributed System Security (NDSS) (February 2006).
-
-
-
-
25
-
-
84858508160
-
-
th Annual Network and Distributed System Security Symposium (February 2005).
-
th Annual Network and Distributed System Security Symposium (February 2005).
-
-
-
-
27
-
-
36949005160
-
Midgard Worms: Sudden Nasty Surprises from a. Large Resilient Zombie Army
-
Tech. Rep. CSD-TR040019, University of Oregon
-
REIHER, P., LI, J., AND KUENNING, G. Midgard Worms: Sudden Nasty Surprises from a. Large Resilient Zombie Army. Tech. Rep. CSD-TR040019, University of Oregon, 2006.
-
(2006)
-
-
REIHER, P.1
LI, J.2
KUENNING, G.3
-
29
-
-
84858508157
-
-
th Symposium on Network and Distributed System Security (NDSS) (February 2006).
-
th Symposium on Network and Distributed System Security (NDSS) (February 2006).
-
-
-
-
30
-
-
84991765629
-
Automated Worm Fingerprinting
-
SINGH, S., ESTAN, C., VARGHESE, G., AND SAVAGE, S. Automated Worm Fingerprinting. In Proceedings of Symposium on Operating Systems Design and Implementation (OSDI) (2004).
-
(2004)
Proceedings of Symposium on Operating Systems Design and Implementation (OSDI)
-
-
SINGH, S.1
ESTAN, C.2
VARGHESE, G.3
SAVAGE, S.4
-
31
-
-
36949030406
-
-
THE CAMBRIDGE-MIT INSTITUTE. DoS-Resistant Internet Working Group Meetings, February 2005.
-
THE CAMBRIDGE-MIT INSTITUTE. DoS-Resistant Internet Working Group Meetings, February 2005.
-
-
-
-
32
-
-
26844548971
-
-
THE HONEYNET PROJECT SZ RESEARCH ALLIANCE, March
-
THE HONEYNET PROJECT SZ RESEARCH ALLIANCE. Know your Enemy: Tracking Botnets. http://www.honeynet.org, March 2005.
-
(2005)
Know your Enemy: Tracking Botnets
-
-
-
35
-
-
33750352075
-
Shield: Vulnerability-Driven Network Filters for Preventing Known Vulnerability Exploits
-
August
-
WANG, H. J., GUO, C., SIMON, D. R., AND ZUGENMAIER, A. Shield: Vulnerability-Driven Network Filters for Preventing Known Vulnerability Exploits. In ACM SIGCOMM (August 2004).
-
(2004)
ACM SIGCOMM
-
-
WANG, H.J.1
GUO, C.2
SIMON, D.R.3
ZUGENMAIER, A.4
|