-
2
-
-
84861271517
-
-
Anonymous
-
Anonymous. Once upon a free(). http://doc.bughunter.net/ buffer-overflow/free.html.
-
Once upon a free()
-
-
-
3
-
-
85038810709
-
Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks
-
W. X. S. Bhatkar and R. Sekar. Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks. In Proceedings of 15th USENIX Security Symposium, 2006.
-
(2006)
Proceedings of 15th USENIX Security Symposium
-
-
Bhatkar, W.X.S.1
Sekar, R.2
-
4
-
-
33751056900
-
Towards automatic generation of vulnerability-based signatures
-
May
-
D. Brumley, J. Newsome, D. Song, H. Wang, and S. Jha. Towards automatic generation of vulnerability-based signatures. In Proceedings of the 2006 IEEE Symposium on Security and Privacy, May 2006.
-
(2006)
Proceedings of the 2006 IEEE Symposium on Security and Privacy
-
-
Brumley, D.1
Newsome, J.2
Song, D.3
Wang, H.4
Jha, S.5
-
5
-
-
48649083443
-
-
R. Chinchani and E. Berg. fast static analysis approach to detect exploit code inside network flows. In In Recent Advances in Intrusion Detection, Seattle, WA, 2005.
-
R. Chinchani and E. Berg. fast static analysis approach to detect exploit code inside network flows. In In Recent Advances in Intrusion Detection, Seattle, WA, 2005.
-
-
-
-
6
-
-
27544433210
-
Semantics-aware malware detection
-
Oakland, CA, May
-
M. Christodorescu, S. Jha, S. Seshia, D. Song, and R. Bryant. Semantics-aware malware detection. In Security and Privacy Conference, Oakland, CA, May 2005.
-
(2005)
Security and Privacy Conference
-
-
Christodorescu, M.1
Jha, S.2
Seshia, S.3
Song, D.4
Bryant, R.5
-
7
-
-
84885679117
-
Vigilante: End-to-end containment of Internet worms
-
M. Costa, J. Crowcroft, M. Castro, A. Rowstron, L. Zhou, L. Zhang, and P. Barham. Vigilante: end-to-end containment of Internet worms. In Proceedings of the 20th ACM Symposium on Operating Systems Principles, 2005.
-
(2005)
Proceedings of the 20th ACM Symposium on Operating Systems Principles
-
-
Costa, M.1
Crowcroft, J.2
Castro, M.3
Rowstron, A.4
Zhou, L.5
Zhang, L.6
Barham, P.7
-
8
-
-
47149094631
-
StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks
-
Crispin Cowan, Calton Pu, Dave Maier, Heather Hintony, Jonathan Walpole, Peat Bakke, Steve Beattie, Aaron Grier, PerryWagle and Qian Zhang. StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks. In 7th USENIX Security Symposium, 2002.
-
(2002)
7th USENIX Security Symposium
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Hintony, H.4
Walpole, J.5
Bakke, P.6
Beattie, S.7
Aaron Grier, P.8
Zhang, Q.9
-
9
-
-
3543086916
-
Formalizing sensitivity in static analysis for intrusion detection
-
Oakland, CA
-
H. Feng, J. Giffin, Y. Huang, S. Jha, W. Lee, and B. Miller. Formalizing sensitivity in static analysis for intrusion detection. In Proceedings the IEEE Symposium on Security and Privacy, Oakland, CA, 2004.
-
(2004)
Proceedings the IEEE Symposium on Security and Privacy
-
-
Feng, H.1
Giffin, J.2
Huang, Y.3
Jha, S.4
Lee, W.5
Miller, B.6
-
10
-
-
0038825045
-
Anomaly detection using call stack information
-
Oakland, CA
-
H. Feng, O. Kolesnikov, P. Fogla, W. Lee, and W. Gong. Anomaly detection using call stack information. In Proceedings of the IEEE Security and Privacy Conference, Oakland, CA, 2003.
-
(2003)
Proceedings of the IEEE Security and Privacy Conference
-
-
Feng, H.1
Kolesnikov, O.2
Fogla, P.3
Lee, W.4
Gong, W.5
-
11
-
-
34547359214
-
Evading network anomaly detection systems: Formal reasoning and practical techniques
-
P. Fogla and W. Lee. Evading network anomaly detection systems: formal reasoning and practical techniques. In Proceedings of the 13th ACM CCS, 2006.
-
(2006)
Proceedings of the 13th ACM CCS
-
-
Fogla, P.1
Lee, W.2
-
12
-
-
33750298577
-
Automated discovery of mimicry attacks
-
D. Zamboni and C. Krügel, editors, RAID, of, Springer
-
J. T. Giffin, S. Jha, and B. P. Miller. Automated discovery of mimicry attacks. In D. Zamboni and C. Krügel, editors, RAID, volume 4219 of Lecture Notes in Computer Science. Springer, 2006.
-
(2006)
Lecture Notes in Computer Science
, vol.4219
-
-
Giffin, J.T.1
Jha, S.2
Miller, B.P.3
-
13
-
-
85077528077
-
Automating mimicry attacks using static binary analysis
-
Baltimore, MD, August
-
C. Krügel, E. Kirda, D. Mutz, W. Robertson, and G. Vigna. Automating mimicry attacks using static binary analysis. In 14th Usenix Security Symposium, Baltimore, MD, August 2005.
-
(2005)
14th Usenix Security Symposium
-
-
Krügel, C.1
Kirda, E.2
Mutz, D.3
Robertson, W.4
Vigna, G.5
-
14
-
-
33746389292
-
Polymorphic worm detection using structural information of executables
-
Seattle, WA, October
-
C. Krügel, E. Kirda, D. Mutz, W. Robertson, and G. Vigna. Polymorphic worm detection using structural information of executables. In RAID, Seattle, WA, October 2005.
-
(2005)
RAID
-
-
Krügel, C.1
Kirda, E.2
Mutz, D.3
Robertson, W.4
Vigna, G.5
-
15
-
-
14844319067
-
Anomaly detection of web-based attacks
-
New York, NY, USA, ACM Press
-
C. Krügel and G. Vigna. Anomaly detection of web-based attacks. In CCS '03: Proceedings of the 10th ACM conference on Computer and communications security, pages 251-261, New York, NY, USA, 2003. ACM Press.
-
(2003)
CCS '03: Proceedings of the 10th ACM conference on Computer and communications security
, pp. 251-261
-
-
Krügel, C.1
Vigna, G.2
-
17
-
-
0037661195
-
Network traffic anomaly detection based on packet bytes
-
New York, NY, USA, ACM Press
-
M. V. Mahoney. Network traffic anomaly detection based on packet bytes. In SAC '03: Proceedings of the 2003 ACM symposium on Applied computing, pages 346-350, New York, NY, USA, 2003. ACM Press.
-
(2003)
SAC '03: Proceedings of the 2003 ACM symposium on Applied computing
, pp. 346-350
-
-
Mahoney, M.V.1
-
21
-
-
79953672829
-
Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
-
J. Newsome and D. X. Song. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In Proceedings of the NDSS, 2005.
-
(2005)
Proceedings of the NDSS
-
-
Newsome, J.1
Song, D.X.2
-
22
-
-
48649106120
-
-
Open Source Vulnerability Database. Subversion date parsing overflow. http://osvdb.org/displayvuln.php?osvdbid=6301, 2004.
-
Open Source Vulnerability Database. Subversion date parsing overflow. http://osvdb.org/displayvuln.php?osvdbid=6301, 2004.
-
-
-
-
23
-
-
33751051489
-
Misleading worm signature generators using deliberate noise injection
-
May
-
R. Perdisci, D. Dagon, W. Lee, P. Fogla, and M. Sharif. Misleading worm signature generators using deliberate noise injection. In Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P'06), May 2006.
-
(2006)
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P'06)
-
-
Perdisci, R.1
Dagon, D.2
Lee, W.3
Fogla, P.4
Sharif, M.5
-
24
-
-
33750325871
-
Argos: An emulator for fingerprinting zero-day attacks
-
Leuven, Belgium, April
-
G. Portokalidis, A. Slowinska, and H. Bos. Argos: an emulator for fingerprinting zero-day attacks. In Proc. ACM SIGOPS EUROSYS'2006, Leuven, Belgium, April 2006.
-
(2006)
Proc. ACM SIGOPS EUROSYS'2006
-
-
Portokalidis, G.1
Slowinska, A.2
Bos, H.3
-
32
-
-
21844456680
-
Shield: Vulnerability-driven network filters for preventing known vulnerability exploits
-
H. J. Wang, C. Guo, D. R. Simon, and A. Zugenmaier. Shield: vulnerability-driven network filters for preventing known vulnerability exploits. SIGCOMM Comput. Commun. Rev., 34(4):193-204, 2004.
-
(2004)
SIGCOMM Comput. Commun. Rev
, vol.34
, Issue.4
, pp. 193-204
-
-
Wang, H.J.1
Guo, C.2
Simon, D.R.3
Zugenmaier, A.4
-
34
-
-
34547261222
-
Packet vaccine: Black-box exploit detection and signature generation
-
X. Wang, Z. Li, J. Xu, M. K. Reiter, C. Kil, and J. Y. Choi. Packet vaccine: black-box exploit detection and signature generation. In Proceedings of the 13th ACM CCS, 2006.
-
(2006)
Proceedings of the 13th ACM CCS
-
-
Wang, X.1
Li, Z.2
Xu, J.3
Reiter, M.K.4
Kil, C.5
Choi, J.Y.6
-
35
-
-
85027555608
-
-
X.Wang, C.-C. Pan, P. Liu, and S. Zh. Sigfree: A signature-free buffer overflow attack blocker. In Proceedings of 15th USENIX Security Symposium, 2006.
-
X.Wang, C.-C. Pan, P. Liu, and S. Zh. Sigfree: A signature-free buffer overflow attack blocker. In Proceedings of 15th USENIX Security Symposium, 2006.
-
-
-
|