-
1
-
-
0006100649
-
Smashing the stack for fun and profit
-
ALEPHONE
-
ALEPHONE. Smashing the Stack for Fun and Profit. Phrack 7, 49-14 (1996).
-
(1996)
Phrack
, vol.7
, pp. 49-14
-
-
-
6
-
-
77952397606
-
-
Shellforge Project
-
BIONDI, P. Shellforge Project, 2006. httpa://www.secdev.org/projects/ shellforge/.
-
(2006)
-
-
Biondi, P.1
-
7
-
-
33751056900
-
Towards automatic generation of vulnerability-based signatures
-
BRUMLEY, D., NEWSOME, J., SONG, D., WANG, H., and JHA, S. Towards Automatic Generation of Vulnerability-Based Signatures. In Proceedings of the IEEE Symposium on Security and Privacy (2006).
-
Proceedings of the IEEE Symposium on Security and Privacy (2006)
-
-
Brumley, D.1
Newsome, J.2
Song, D.3
Wang, H.4
Jha, S.5
-
9
-
-
84885679117
-
Vigilante: End-to-end containment of internet worms
-
October
-
COSTA, M., CROWCROFT, J., CASTRO, M., and ROWSTRON, A. Vigilante: End-to-End Containment of Internet Worms. In Proceedings of the Symposium on Systems and Operating Systems Principles (SOSP) (October 2005).
-
(2005)
Proceedings of the Symposium on Systems and Operating Systems Principles (SOSP)
-
-
Costa, M.1
Crowcroft, J.2
Castro, M.3
Rowstron, A.4
-
10
-
-
85084160243
-
Stackguard: Automatic adaptive detection and prevention of buffer-overflow attacks
-
COWAN, C., PU, C., MAIER, D., HINTON, H., WALPOLE, J., BAKKE, P., BEATTIE, S., GRIER, A., WAGLE, P., and ZHANG, Q. Stackguard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks. In Proceedings of the USENIX Security Symposium (1998).
-
(1998)
Proceedings of the USENIX Security Symposium
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Hinton, H.4
Walpole, J.5
Bakke, P.6
Beattie, S.7
Grier, A.8
Wagle, P.9
Zhang, Q.10
-
12
-
-
34548717095
-
ShieldGen: Automated data patch generation for unknown vulnerabilities with informed probing
-
May
-
CUI, W., PEINADO, M., WANG, H. J., and LOCASTO, M. E. ShieldGen: Automated Data Patch Generation for Unknown Vulnerabilities with Informed Probing. In Proceedings of the IEEE Symposium on Security and Privacy (May 2007).
-
(2007)
Proceedings of the IEEE Symposium on Security and Privacy
-
-
Cui, W.1
Peinado, M.2
Wang, H.J.3
Locasto, M.E.4
-
13
-
-
33644565261
-
Polymorphic shellcode engine using spectrum analysis
-
DETRISTAN, T., ULENSPIEGEL, T., MALCOM, Y., and VON UNDERDUK, M. S. Polymorphic Shellcode Engine Using Spectrum Analysis. Phrack 11, 61-9 (2003).
-
(2003)
Phrack
, vol.11
, pp. 61-69
-
-
Detristan, T.1
Ulenspiegel, T.2
Malcom, Y.3
Von Underduk, M.S.4
-
14
-
-
77952336496
-
Smashing the Kernel Stack for Fun and Profit
-
EREN, S. Smashing the Kernel Stack for Fun and Profit. Phrack 11, 60-6 (2003).
-
(2003)
Phrack
, vol.11
, pp. 60-66
-
-
Eren, S.1
-
18
-
-
84885639914
-
Detecting past and present intrusions through vulnerability-specific predicates
-
October
-
JOSHI, A., KING, S. T., DUNLAP, G. W., and CHEN, P. M. Detecting Past and Present Intrusions through Vulnerability-Specific Predicates. In Proceedings of the Symposium on Systems and Operating Systems Principles (SOSP) (October 2005).
-
(2005)
Proceedings of the Symposium on Systems and Operating Systems Principles (SOSP)
-
-
Joshi, A.1
King, S.T.2
Dunlap, G.W.3
Chen, P.M.4
-
19
-
-
77952355531
-
-
K2. ADMmutate documentation
-
K2. ADMmutate documentation, 2003. httpa://www.ktwo.ca/ADMmutate-0.8.4. tar.gz.
-
(2003)
-
-
-
23
-
-
33746389292
-
Polymorphic worm detection using structural information of executables
-
September
-
KRUGEL, C., KIRDA, E., MUTZ, D., ROBERTSON, W., and VIGNA, G. Polymorphic Worm Detection Using Structural Information of Executables. In Proceedings of the 8th International Symposium on Recent Advances in Intrusion Detection (RAID) (September 2005), pp. 207-226.
-
(2005)
Proceedings of the 8th International Symposium on Recent Advances in Intrusion Detection (RAID)
, pp. 207-226
-
-
Krugel, C.1
Kirda, E.2
Mutz, D.3
Robertson, W.4
Vigna, G.5
-
26
-
-
77952327721
-
-
METASPLOIT DEVELOPEMENT TEAM, Metasploit Project
-
METASPLOIT DEVELOPEMENT TEAM. Metasploit Project, 2006. httpa://www.metasploit.com.
-
(2006)
-
-
-
30
-
-
77952338015
-
Building IA32 'Unicode-Proof' Shellcodes
-
OBSCOU. Building IA32 'Unicode-Proof' Shellcodes. Phrack 11, 61-11 (2003).
-
(2003)
Phrack
, vol.11
, pp. 61-11
-
-
-
32
-
-
77952348035
-
-
Rix. Writing IA-32 Alphanumeric Shellcodes
-
Rix. Writing IA-32 Alphanumeric Shellcodes. Phrack 11, 57-15 (2001).
-
(2001)
Phrack
, vol.11
, pp. 57-15
-
-
-
35
-
-
84991765629
-
Automated worm fingerprinting
-
SINGH, S., ESTAN, C., VARGHESE, G., and SAVAGE, S. Automated Worm Fingerprinting. In Proceedings of Symposium on Operating Systems Design and Implementation (OSDI) (2004).
-
(2004)
Proceedings of Symposium on Operating Systems Design and Implementation (OSDI)
-
-
Singh, S.1
Estan, C.2
Varghese, G.3
Savage, S.4
-
36
-
-
77952339829
-
-
SNORT DEVELOPMENT TEAM. Snort Project
-
SNORT DEVELOPMENT TEAM. Snort Project. httpa://www.snort.org/.
-
-
-
-
37
-
-
0037269111
-
Reliable identification of bounded-length viruses is NP-complete
-
January
-
SPINELLIS, D. Reliable identification of bounded-length viruses is NP-complete. IEEE Transactions on Information Theory 49, 1 (January 2003), 280-284.
-
(2003)
IEEE Transactions on Information Theory
, vol.49
, Issue.1
, pp. 280-284
-
-
Spinellis, D.1
-
39
-
-
21844456680
-
Shield: Vulnerability-driven network filters for preventing known vulnerability exploits
-
August
-
WANG, H. J., GUO, C., SIMON, D. R., and ZUGENMAIER, A. Shield: Vulnerability-Driven Network Filters for Preventing Known Vulnerability Exploits. In Proceedings of the ACM SIGCOMM Conference (August 2004), pp. 193-204.
-
(2004)
Proceedings of the ACM SIGCOMM Conference
, pp. 193-204
-
-
Wang, H.J.1
Guo, C.2
Simon, D.R.3
Zugenmaier, A.4
|