-
1
-
-
0141762461
-
Code-red: A case study on the spread and victims of an internet worm
-
Marseille, France, November
-
D. Moore, C. Shannon, and J. Brown, "Code-red: a case study on the spread and victims of an internet worm," in Proceedings of the 2-th Internet Measurement Workshop (IMW), Marseille, France, November 2002.
-
(2002)
Proceedings of the 2-th Internet Measurement Workshop (IMW)
-
-
Moore, D.1
Shannon, C.2
Brown, J.3
-
2
-
-
0742276097
-
Inside the slammer worm
-
July
-
D. Moore, V. Paxson, and S. Savage, "Inside the slammer worm," IEEE Magazine of Security and Privacy, vol. 4, no. 1, pp. 33-39, July 2003.
-
(2003)
IEEE Magazine of Security and Privacy
, vol.4
, Issue.1
, pp. 33-39
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
-
3
-
-
33750328206
-
Opportunistic measurement: Extracting insight from spurious traffic
-
College Park, MD, November
-
M. Casado, T. Garfinkel, W. Cui, V. Paxson, and S. Savage, "Opportunistic measurement: Extracting insight from spurious traffic," in Proceedings of the 4-th ACM SIGCOMM HotNets Workshop (HotNets), College Park, MD, November 2005.
-
(2005)
Proceedings of the 4-th ACM SIGCOMM HotNets Workshop (HotNets)
-
-
Casado, M.1
Garfinkel, T.2
Cui, W.3
Paxson, V.4
Savage, S.5
-
4
-
-
84892612179
-
An effective architecture and algorithm for detecting worms with various scan techniques
-
San Diego, CA, Febrary
-
J. Wu, S. Vangala, and L. X. Gao, "An effective architecture and algorithm for detecting worms with various scan techniques," in Proceedings of the 11-th IEEE Network and Distributed System Security Symposium, (NDSS), San Diego, CA, Febrary 2004.
-
(2004)
Proceedings of the 11-th IEEE Network and Distributed System Security Symposium, (NDSS)
-
-
Wu, J.1
Vangala, S.2
Gao, L.X.3
-
5
-
-
33749864044
-
New streaming algorithms for superspreader detection
-
San Diego, CA, Febrary
-
S. Venkataraman, D. Song, P. Gibbons, and A. Blum, "New streaming algorithms for superspreader detection," in Proceedings of the 12-th IEEE Network and Distributed Systems Security Symposium (NDSS), San Diego, CA, Febrary 2005.
-
(2005)
Proceedings of the 12-th IEEE Network and Distributed Systems Security Symposium (NDSS)
-
-
Venkataraman, S.1
Song, D.2
Gibbons, P.3
Blum, A.4
-
6
-
-
26844510250
-
Monitoring and early detection for internet worms
-
Washington DC, October
-
C. Zou, W. B. Gong, D. Towsley, and L. X. Gao, "Monitoring and early detection for internet worms," in Proceedings of the 10-th ACM Conference on Computer and Communication Security (CCS), Washington DC, October 2003.
-
(2003)
Proceedings of the 10-th ACM Conference on Computer and Communication Security (CCS)
-
-
Zou, C.1
Gong, W.B.2
Towsley, D.3
Gao, L.X.4
-
7
-
-
50049110702
-
Effective detection of active worms with varying scan rate
-
Baltimore, MD, August
-
W. Yu, X. Wang, D. Xuan, and D. Lee, "Effective detection of active worms with varying scan rate," in Proceedings of IEEE International Conference on Security and Privacy in Communication Networks (SecureComm), Baltimore, MD, August 2006.
-
(2006)
Proceedings of IEEE International Conference on Security and Privacy in Communication Networks (SecureComm)
-
-
Yu, W.1
Wang, X.2
Xuan, D.3
Lee, D.4
-
9
-
-
0034838197
-
Data mining methods for detection of new malicious executables
-
Oakland. CA. May
-
M. G. Schultz, E. Eskin, E. Zadok, and S. J. Stolfo, "Data mining methods for detection of new malicious executables," in Proceedings of IEEE Symposium, on Security and. Privacy (S&P), Oakland. CA. May 2001.
-
(2001)
Proceedings of IEEE Symposium, on Security and. Privacy (S&P)
-
-
Schultz, M.G.1
Eskin, E.2
Zadok, E.3
Stolfo, S.J.4
-
10
-
-
35348856143
-
Detecting self-mutating malware using control flow graph matching
-
Berlin, Germany, July
-
D. Bruschi, L. Martignoni, and M. Monga, "Detecting self-mutating malware using control flow graph matching," in Proceedings of the Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), Berlin, Germany, July 2006.
-
(2006)
Proceedings of the Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA)
-
-
Bruschi, D.1
Martignoni, L.2
Monga, M.3
-
13
-
-
51349132204
-
-
MetaPHOR
-
MetaPHOR, http://securityresponse.symantec.com/avcenter/venc/data/w32. simile.html.
-
-
-
-
14
-
-
51349093181
-
-
P. Ferrie and P. Ször. Zmist, Zmist opportunities, Virus Bullettin, http://www.virusbtn.com.
-
P. Ferrie and P. Ször. Zmist, Zmist opportunities, Virus Bullettin, http://www.virusbtn.com.
-
-
-
-
16
-
-
51349135296
-
-
Department of Computer Science, Stony Brook University
-
Shengying Li, A Survey on Tools for Binary Code Analysis, Department of Computer Science, Stony Brook University, http://www.cs.sunysb. edu/lshengyi/papers/rpe/RPE.htm, 2004.
-
(2004)
A Survey on Tools for Binary Code Analysis
-
-
Li, S.1
-
17
-
-
70349100099
-
Anomaly detection using call stack information
-
Oakland, CA, May
-
H. H. Feng, O. M. Kolesnikov, P. Fogla, W. Lee, and W. Gong, "Anomaly detection using call stack information," in Proceedings of IEEE Symposium on Security and Privacy (S&P), Oakland, CA, May 2003.
-
(2003)
Proceedings of IEEE Symposium on Security and Privacy (S&P)
-
-
Feng, H.H.1
Kolesnikov, O.M.2
Fogla, P.3
Lee, W.4
Gong, W.5
-
20
-
-
51349163787
-
-
VMWare Inc
-
VMWare Inc., www.vmware.com/virtual-machine.
-
l-machine
-
-
-
21
-
-
51349104076
-
-
Microsoft, Microsoft Virtual PC, http://www.microsoft.com/windows /virtualpc/default.mspx.
-
Microsoft, Microsoft Virtual PC, http://www.microsoft.com/windows /virtualpc/default.mspx.
-
-
-
-
22
-
-
78349253342
-
-
Metasploit LLC, Windows System Call Table, http://www.metasploit. com/users/opcode/syscalls.html.
-
Windows System Call Table
-
-
-
23
-
-
51349112718
-
-
Operating System Inside, Linux System Call Table, http://osinside.net /syscall/system_call_table.htm, 2006.
-
Operating System Inside, Linux System Call Table, http://osinside.net /syscall/system_call_table.htm, 2006.
-
-
-
-
25
-
-
51349094527
-
-
GNU Project
-
GNU Project, Linux Function and Macro Index, http://www.gnu.org /software/libc/manual/html_node/Function-Index.html#Function-lndex.
-
Linux Function and Macro Index
-
-
-
29
-
-
31844436472
-
-
BindView Corporation
-
BindView Corporation, Strace for NT, http://www.bindview.com/ Services/RAZOR/Utilities/Windows/strace_readme.cfm.
-
Strace for NT
-
-
-
32
-
-
3543096392
-
Fast portscan detection using sequential hypothesis testing
-
Oakland, CA, May
-
J. Jung, V. Paxson, A. W. Berger, and H. Balakrishnan, "Fast portscan detection using sequential hypothesis testing," in Proceedings of the 25-th IEEE Symposium on Security and Privacy (S&P), Oakland, CA, May 2004.
-
(2004)
Proceedings of the 25-th IEEE Symposium on Security and Privacy (S&P)
-
-
Jung, J.1
Paxson, V.2
Berger, A.W.3
Balakrishnan, H.4
-
33
-
-
33746603312
-
Mining anomalies using traffic feature distribution
-
Philadelphia, PA, August
-
A. Lakhina, M. Crovella, and C. Diot, "Mining anomalies using traffic feature distribution," in Proceedings of ACM SIGCOMM, Philadelphia, PA, August 2005.
-
(2005)
Proceedings of ACM SIGCOMM
-
-
Lakhina, A.1
Crovella, M.2
Diot, C.3
-
34
-
-
51349114948
-
Polymorphic blending attacks
-
Vancouver, B.C, August
-
R. Perdisci, O. Kolesnikov, P. Fogla, M. Sharif, and W. Lee, "Polymorphic blending attacks," in Proceedings of the 15-th USENIX Security Symposium. (SECURITY), Vancouver, B.C., August 2006.
-
(2006)
Proceedings of the 15-th USENIX Security Symposium. (SECURITY)
-
-
Perdisci, R.1
Kolesnikov, O.2
Fogla, P.3
Sharif, M.4
Lee, W.5
-
35
-
-
51349093182
-
-
Binary Text Scan, http://netninja.com/files/bintxtscan.zip.
-
Binary Text Scan
-
-
-
37
-
-
51349165578
-
Behavioral distance for intrusion detection
-
Seattle, WA, September
-
D. Gao, M. Reiter, and Dawn Song, "Behavioral distance for intrusion detection," in Proceedings of Symposium on Recent Advance in Intrusion Detection (RAID), Seattle, WA, September 1999.
-
(1999)
Proceedings of Symposium on Recent Advance in Intrusion Detection (RAID)
-
-
Gao, D.1
Reiter, M.2
Song, D.3
-
38
-
-
3543086916
-
Formalizing sensitivity in static analysis for intrusion detection
-
Oakland, CA, May
-
H. H Feng, J. T. Giffin, Y. Huang, S. Jha, W. Lee, and B. P. Miller, "Formalizing sensitivity in static analysis for intrusion detection," in Proceedings of IEEE Symposium, on Security and Privacy (S&P), Oakland, CA, May 2004.
-
(2004)
Proceedings of IEEE Symposium, on Security and Privacy (S&P)
-
-
Feng, H.H.1
Giffin, J.T.2
Huang, Y.3
Jha, S.4
Lee, W.5
Miller, B.P.6
-
39
-
-
85084160243
-
Stack-guard: Automatic adaptive detection and prevention of buffer-overflow attacks
-
San Antonio, TX, August
-
C. Cowan, C. Pu, D. Maier, H. Hinton, P. Bakke, S. Beattie, A. Grier, P. Wagle, and Q. Zhang, "Stack-guard: Automatic adaptive detection and prevention of buffer-overflow attacks," in Proceedings of 7th USENIX Security Symposium (SECURITY), San Antonio, TX, August 1998.
-
(1998)
Proceedings of 7th USENIX Security Symposium (SECURITY)
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Hinton, H.4
Bakke, P.5
Beattie, S.6
Grier, A.7
Wagle, P.8
Zhang, Q.9
-
40
-
-
84940104123
-
A data mining framework for building intrusion detection models
-
Oakland, CA, May
-
W. Lee, S. J. Stolfo, and W. Mok, "A data mining framework for building intrusion detection models," in Proceedings of the 1999 IEEE Symposium, on Security and Privacy (S&P), Oakland, CA, May 1999.
-
(1999)
Proceedings of the 1999 IEEE Symposium, on Security and Privacy (S&P)
-
-
Lee, W.1
Stolfo, S.J.2
Mok, W.3
-
41
-
-
70450140870
-
Analyzing behavioral features for email classification
-
Mountain view, CA, August
-
S. Martin, A. Sewani, B. Nelson, K. Chen, and A. Joseph, "Analyzing behavioral features for email classification," in Proceedings of the 2th International conference on email and anti-span (CEAS), Mountain view, CA, August 2003.
-
(2003)
Proceedings of the 2th International conference on email and anti-span (CEAS)
-
-
Martin, S.1
Sewani, A.2
Nelson, B.3
Chen, K.4
Joseph, A.5
-
42
-
-
34247580997
-
Fast and effective worm fingerprinting via machine learning
-
Dublin, Ireland, June
-
S. Yang, J. P. Song, H. Rajamani, T. W. Cho, Y. Zhang, and R. Mooney, "Fast and effective worm fingerprinting via machine learning," in Proceedings of the 3rd IEEE International Conference on Autonomic Computing (ICAC), Dublin, Ireland, June 2006.
-
(2006)
Proceedings of the 3rd IEEE International Conference on Autonomic Computing (ICAC)
-
-
Yang, S.1
Song, J.P.2
Rajamani, H.3
Cho, T.W.4
Zhang, Y.5
Mooney, R.6
|