-
1
-
-
33846294027
-
Automatic generation of buffer overflow attack signatures: An approach based on program behavior models
-
Z. Liang and R. Sekar, "Automatic generation of buffer overflow attack signatures: An approach based on program behavior models," in Proc. of Computer Security Applications Conference (ACSAC), 2005.
-
(2005)
Proc. of Computer Security Applications Conference (ACSAC)
-
-
Liang, Z.1
Sekar, R.2
-
4
-
-
0033295259
-
Bro: A system for detecting network intruders in real-time
-
V. Paxson, "Bro: A system for detecting network intruders in real-time," Computer Networks, vol. 31, 1999.
-
(1999)
Computer Networks
, vol.31
-
-
Paxson, V.1
-
7
-
-
85084163246
-
Autograph: Toward automated, distributed worm signature detection
-
H. Kim and B. Karp, "Autograph: Toward automated, distributed worm signature detection," in Proc. of USENIX Security Symposium, 2004.
-
(2004)
Proc. of USENIX Security Symposium
-
-
Kim, H.1
Karp, B.2
-
8
-
-
33745800070
-
Fast and automated generation of attack signatures: A basis for building self-protecting servers
-
Z. Liang and R. Sekar, "Fast and automated generation of attack signatures: A basis for building self-protecting servers," in Proc. of ACM CCS, 2005.
-
(2005)
Proc. of ACM CCS
-
-
Liang, Z.1
Sekar, R.2
-
9
-
-
34547261222
-
Packet vaccine: Black-box exploit detection and signature generation
-
X. Wang et al., "Packet vaccine: Black-box exploit detection and signature generation," in Proc. of ACM CCS, 2006.
-
(2006)
Proc. of ACM CCS
-
-
Wang, X.1
-
14
-
-
33751064824
-
Hamsa: Fast signature generation for zero-day polymorphic worms with provable attack resilience
-
Z. Li, M. Sanghi, Y. Chen, M. Kao, and B. Chavez, "Hamsa: Fast signature generation for zero-day polymorphic worms with provable attack resilience," in Proc. of IEEE Security and Privacy Symposium, 2006.
-
(2006)
Proc. of IEEE Security and Privacy Symposium
-
-
Li, Z.1
Sanghi, M.2
Chen, Y.3
Kao, M.4
Chavez, B.5
-
16
-
-
48349097478
-
Defending against internet worms: A signature-based approach
-
Y. Tang and S. Chen, "Defending against internet worms: A signature-based approach," in Proc. of IEEE Infocom, 2003.
-
(2003)
Proc. of IEEE Infocom
-
-
Tang, Y.1
Chen, S.2
-
17
-
-
79953672829
-
Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
-
J. Newsome and D. Song, "Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software," in Proc. of NDSS, 2005.
-
(2005)
Proc. of NDSS
-
-
Newsome, J.1
Song, D.2
-
18
-
-
33745788387
-
On deriving unknown vulnerabilities from zeroday polymorphic and metamorphic worm exploits
-
J. R. Crandall, Z. Su, and S. F. Wu, "On deriving unknown vulnerabilities from zeroday polymorphic and metamorphic worm exploits," in Proc. of ACM CCS, 2005.
-
(2005)
Proc. of ACM CCS
-
-
Crandall, J.R.1
Su, Z.2
Wu, S.F.3
-
19
-
-
33751051489
-
Misleading worm signature generators using deliberate noise injection
-
R. Perdisci et al., "Misleading worm signature generators using deliberate noise injection," in Proc. of IEEE Security and Privacy Symposium, 2006.
-
(2006)
Proc. of IEEE Security and Privacy Symposium
-
-
Perdisci, R.1
-
20
-
-
33846893358
-
Paragraph: Thwarting signature learning by training maliciously
-
J. Newsome, B. Karp, and D. Song, "Paragraph: Thwarting signature learning by training maliciously," in Proc. of RAID, 2006.
-
(2006)
Proc. of RAID
-
-
Newsome, J.1
Karp, B.2
Song, D.3
-
21
-
-
48349122173
-
Allergy attack against automatic signature generation
-
S. P. Chuang and A. K. Mok, "Allergy attack against automatic signature generation," in Proc. of RAID, 2006.
-
(2006)
Proc. of RAID
-
-
Chuang, S.P.1
Mok, A.K.2
-
23
-
-
84923445084
-
An architecture for generating semantic-aware signatures
-
V. Yegneswaran et al., "An architecture for generating semantic-aware signatures," in Proc. of USENIX Security Symposium, 2005.
-
(2005)
Proc. of USENIX Security Symposium
-
-
Yegneswaran, V.1
-
24
-
-
33746389292
-
Polymorphic worm detection using structural information of executables
-
C. Kruegel et al., "Polymorphic worm detection using structural information of executables," in Proc. of RAID, 2005.
-
(2005)
Proc. of RAID
-
-
Kruegel, C.1
-
26
-
-
30344438592
-
Anomalous payload-based network intrusion detection
-
K. Wang and S. J. Stolfo, "Anomalous payload-based network intrusion detection," in Proc. of RAID, 2004.
-
(2004)
Proc. of RAID
-
-
Wang, K.1
Stolfo, S.J.2
-
27
-
-
33750351545
-
Anomalous payload-based worm detection and signature generation
-
K. Wang, G. Cretu, and S. J. Stolfo, "Anomalous payload-based worm detection and signature generation," in Proc. of RAID, 2005.
-
(2005)
Proc. of RAID
-
-
Wang, K.1
Cretu, G.2
Stolfo, S.J.3
-
29
-
-
84885679117
-
-
M. Cost et al., Vigilante: End-to-end containment of internet worms, in Proc. of ACM Symposium on Operating System Principles (SOSP), 2005.
-
M. Cost et al., "Vigilante: End-to-end containment of internet worms," in Proc. of ACM Symposium on Operating System Principles (SOSP), 2005.
-
-
-
-
30
-
-
33745777666
-
Ctcp: A centralized TCP/IP architecture for networking security
-
F. Hsu and T. Chiueh, "Ctcp: A centralized TCP/IP architecture for networking security," in Proc. of ACSAC, 2004.
-
(2004)
Proc. of ACSAC
-
-
Hsu, F.1
Chiueh, T.2
-
31
-
-
85027555608
-
Sigfree: A signature-free buffer overflow attack blocker
-
X. Wang et al., "Sigfree: A signature-free buffer overflow attack blocker," in Proc. of USENIX Security Symposium, 2006.
-
(2006)
Proc. of USENIX Security Symposium
-
-
Wang, X.1
-
32
-
-
14944341848
-
On the design and use of internet sinks for network abuse monitoring
-
V. Yegneswaran, P. Barford, and D. Plonka, "On the design and use of internet sinks for network abuse monitoring," in Proc. of RAID, 2004.
-
(2004)
Proc. of RAID
-
-
Yegneswaran, V.1
Barford, P.2
Plonka, D.3
-
33
-
-
33646000916
-
The internet motion sensor: A distributed blackhole monitoring system
-
M. Bailey et al., "The internet motion sensor: A distributed blackhole monitoring system," in Proc. of NDSS, 2005.
-
(2005)
Proc. of NDSS
-
-
Bailey, M.1
-
34
-
-
48349110924
-
-
ICSI, Tech. Rep. TR-06-004
-
W. Cui, V. Paxson, and N. Weaver, "GQ: Realizing a system to catch worms in a quarter million places," ICSI, Tech. Rep. TR-06-004, 2006.
-
(2006)
GQ: Realizing a system to catch worms in a quarter million places
-
-
Cui, W.1
Paxson, V.2
Weaver, N.3
-
36
-
-
34547396634
-
binpac: A yacc for writing application protocol parsers
-
R. Pang et al., "binpac: A yacc for writing application protocol parsers," in Proc. of ACM/USENIX IMC, 2006.
-
(2006)
Proc. of ACM/USENIX IMC
-
-
Pang, R.1
-
37
-
-
48349130120
-
-
S. A. Vinterbo, Maximum k-intersection, edge labeled multigraph max capacity k-path, and max factor k-gcd are all NP-hard, Decision Systems Group,Harvard Medical School, Tech. Rep., 2002.
-
S. A. Vinterbo, "Maximum k-intersection, edge labeled multigraph max capacity k-path, and max factor k-gcd are all NP-hard," Decision Systems Group,Harvard Medical School, Tech. Rep., 2002.
-
-
-
-
38
-
-
48349107779
-
-
Northwetern University, Tech. Rep. NWU-EECS-07-02
-
Z. Li, L. Wang, Y. Chen, and Z. Fu, "Network-based and attack-resilient length signature generation for zero-day polymorphic worms," Northwetern University, Tech. Rep. NWU-EECS-07-02, 2007.
-
(2007)
Network-based and attack-resilient length signature generation for zero-day polymorphic worms
-
-
Li, Z.1
Wang, L.2
Chen, Y.3
Fu, Z.4
-
39
-
-
85091893445
-
Rethinking hardware support for network analysis and intrusion prevention
-
V. Paxson et al., "Rethinking hardware support for network analysis and intrusion prevention," in Proc. of USENIX Hot Security, 2006.
-
(2006)
Proc. of USENIX Hot Security
-
-
Paxson, V.1
-
40
-
-
77249177810
-
-
Radware Inc
-
Radware Inc., "Introducing 1000X Security Switching," http://www.radware.com/content/products/application_switches/ss/default%.asp.
-
Introducing 1000X Security Switching
-
-
|