-
2
-
-
84928016636
-
The base-rate fallacy and the difficulty of intrusion detection
-
Axelsson S. The base-rate fallacy and the difficulty of intrusion detection. ACM Transactions on Information Systems and Security 3 3 (August 2000) 186-205
-
(2000)
ACM Transactions on Information Systems and Security
, vol.3
, Issue.3
, pp. 186-205
-
-
Axelsson, S.1
-
4
-
-
0017517624
-
Certification of programs for secure information flow
-
Denning D.E., and Denning P.J. Certification of programs for secure information flow. Communication of the ACM 20 7 (1977) 504-513
-
(1977)
Communication of the ACM
, vol.20
, Issue.7
, pp. 504-513
-
-
Denning, D.E.1
Denning, P.J.2
-
6
-
-
0034997451
-
-
Dickinson W, Leon D, Podgurski A. Finding failures by cluster analysis of execution profiles. In: Twenty-third international conference on software engineering, Toronto; May 2001. p. 339-48.
-
Dickinson W, Leon D, Podgurski A. Finding failures by cluster analysis of execution profiles. In: Twenty-third international conference on software engineering, Toronto; May 2001. p. 339-48.
-
-
-
-
8
-
-
0038825045
-
Anomaly detection using call stack information
-
Feng H., Kolesnikov O., Fogla P., Lee W., and Gong W. Anomaly detection using call stack information. IEEE Symposium on Security and Privacy (Oakland, CA) (May 2003)
-
(2003)
IEEE Symposium on Security and Privacy (Oakland, CA)
-
-
Feng, H.1
Kolesnikov, O.2
Fogla, P.3
Lee, W.4
Gong, W.5
-
9
-
-
0016382977
-
Memoryless subsystems
-
Fenton J.S. Memoryless subsystems. The Computer Journal 17 2 (1974) 143-147
-
(1974)
The Computer Journal
, vol.17
, Issue.2
, pp. 143-147
-
-
Fenton, J.S.1
-
10
-
-
0029716418
-
A sense of self for UNIX processes
-
Forrest S., Hofmeyr S.S., Somayaji A., and Longstaff T.A. A sense of self for UNIX processes. IEEE Symposium on Security and Privacy (Los Alamitos, CA) (1996) 120-128
-
(1996)
IEEE Symposium on Security and Privacy (Los Alamitos, CA)
, pp. 120-128
-
-
Forrest, S.1
Hofmeyr, S.S.2
Somayaji, A.3
Longstaff, T.A.4
-
11
-
-
33846282899
-
-
Department of Information and Computer Science, University of California, Irvine
-
Haldar V., Chandra D., and Franz M. Practical, dynamic information-flow for virtual machines. Technical report no. 05-02 (February 2005), Department of Information and Computer Science, University of California, Irvine
-
(2005)
Practical, dynamic information-flow for virtual machines. Technical report no. 05-02
-
-
Haldar, V.1
Chandra, D.2
Franz, M.3
-
14
-
-
85086751334
-
-
Leon D, Masri W, Podgurski A. An empirical evaluation of test case filtering techniques based on exercising complex information flows. In: Twenty-seventh international conference on software engineering (St. Louis, MO); May 2005.
-
Leon D, Masri W, Podgurski A. An empirical evaluation of test case filtering techniques based on exercising complex information flows. In: Twenty-seventh international conference on software engineering (St. Louis, MO); May 2005.
-
-
-
-
15
-
-
53049097893
-
-
Liepins G, Vaccaro HS. Anomaly detection: purpose and framework. In: Twelfth national computer security conference (Baltimore); 1989. p. 495-504.
-
Liepins G, Vaccaro HS. Anomaly detection: purpose and framework. In: Twelfth national computer security conference (Baltimore); 1989. p. 495-504.
-
-
-
-
16
-
-
53049092327
-
-
Masri W. Dynamic information flow analysis. Slicing and profiling. Ph.D. dissertation; 2004. http://softlabnet.cwru.edu.
-
Masri W. Dynamic information flow analysis. Slicing and profiling. Ph.D. dissertation; 2004. http://softlabnet.cwru.edu.
-
-
-
-
17
-
-
34547691021
-
-
Masri W, Nahas N, Podgurski A. Memorized forward computation of program slices. In: Seventeenth IEEE international symposium on software reliability engineering, ISSRE 2006. Raleigh, NC, USA; November 2006.
-
Masri W, Nahas N, Podgurski A. Memorized forward computation of program slices. In: Seventeenth IEEE international symposium on software reliability engineering, ISSRE 2006. Raleigh, NC, USA; November 2006.
-
-
-
-
18
-
-
16244362392
-
-
Masri W, Podgurski A, Leon D. Detecting and debugging insecure information flows. In: Fifteenth IEEE international symposium on software reliability engineering, ISSRE 2004, St. Malo, France; November 2-5, 2004.
-
Masri W, Podgurski A, Leon D. Detecting and debugging insecure information flows. In: Fifteenth IEEE international symposium on software reliability engineering, ISSRE 2004, St. Malo, France; November 2-5, 2004.
-
-
-
-
19
-
-
85085405276
-
-
Masri W, Podgurski A. Using dynamic information flow analysis to detect attacks against applications. In: 2005 Workshop on Software Engineering for Security Systems (St. Louis, MI); May 2005.
-
Masri W, Podgurski A. Using dynamic information flow analysis to detect attacks against applications. In: 2005 Workshop on Software Engineering for Security Systems (St. Louis, MI); May 2005.
-
-
-
-
20
-
-
34250772325
-
an empirical study of test case filtering techniques based on exercising information flows
-
Masri W., Podgurski A., and Leon D. an empirical study of test case filtering techniques based on exercising information flows. IEEE Transactions on Software Engineering 33 7 (July 2007) 454
-
(2007)
IEEE Transactions on Software Engineering
, vol.33
, Issue.7
, pp. 454
-
-
Masri, W.1
Podgurski, A.2
Leon, D.3
-
21
-
-
53049083088
-
-
McCamant S, Ernst M. Quantitative information-flow tracking for C and related languages. MIT computer science and artificial intelligence laboratory technical report MIT-CSAIL-TR-2006-076 (Cambridge, MA); November 17, 2006.
-
McCamant S, Ernst M. Quantitative information-flow tracking for C and related languages. MIT computer science and artificial intelligence laboratory technical report MIT-CSAIL-TR-2006-076 (Cambridge, MA); November 17, 2006.
-
-
-
-
22
-
-
36448929074
-
-
McCamant S, Ernst M. A simulation-based proof technique for dynamic information flow. In: ACM SIGPLAN workshop on programming languages and analysis for security (San Diego, Calfornia, USA); June 14, 2007.
-
McCamant S, Ernst M. A simulation-based proof technique for dynamic information flow. In: ACM SIGPLAN workshop on programming languages and analysis for security (San Diego, Calfornia, USA); June 14, 2007.
-
-
-
-
23
-
-
33646936897
-
-
McMaster S, Memon A. Call stack coverage for test suite reduction. In: Twenty-first international conference on software maintenance, Butapest, Hungary; September 2005.
-
McMaster S, Memon A. Call stack coverage for test suite reduction. In: Twenty-first international conference on software maintenance, Butapest, Hungary; September 2005.
-
-
-
-
24
-
-
53049088604
-
-
Newsome J, Song DX. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In: Twelfth network and distributed system security symposium, San Diego, California; February 2005.
-
Newsome J, Song DX. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In: Twelfth network and distributed system security symposium, San Diego, California; February 2005.
-
-
-
-
25
-
-
53049109364
-
-
Orso A, Kennedy B. Selective capture and replay of program executions. In: 2005 Workshop on dynamic analysis (St. Louis); May 2005.
-
Orso A, Kennedy B. Selective capture and replay of program executions. In: 2005 Workshop on dynamic analysis (St. Louis); May 2005.
-
-
-
-
26
-
-
53049108341
-
-
Perl.org. The perl directory, .
-
Perl.org. The perl directory, .
-
-
-
-
27
-
-
0034593043
-
-
Steven S, Chandra P, Fleck B, Podgurski A. jRapture: a capture/replay tool for observation-based testing. In: 2000 international symposium on software testing and analysis (Portland, Oregon); August 2000. p. 158-67.
-
Steven S, Chandra P, Fleck B, Podgurski A. jRapture: a capture/replay tool for observation-based testing. In: 2000 international symposium on software testing and analysis (Portland, Oregon); August 2000. p. 158-67.
-
-
-
-
28
-
-
12844267418
-
-
Suh GE, Lee J, Devadas S. Secure program execution via dynamic information flow tracking. In: Eleventh international conference on architectural support for programming languages and operating systems (Boston, MA); 2004.
-
Suh GE, Lee J, Devadas S. Secure program execution via dynamic information flow tracking. In: Eleventh international conference on architectural support for programming languages and operating systems (Boston, MA); 2004.
-
-
-
-
30
-
-
53049096256
-
-
Tan K, Killourhy K, Maxion R. Undermining an anomaly-based intrusion detection system using common exploits. In: Fifth international symposium on recent advances in intrusion detection (Zurich); October 2002.
-
Tan K, Killourhy K, Maxion R. Undermining an anomaly-based intrusion detection system using common exploits. In: Fifth international symposium on recent advances in intrusion detection (Zurich); October 2002.
-
-
-
-
32
-
-
21644475650
-
-
Vachharajani N, Bridges M, Chang J, Rangan R, Ottoni G, Blome J, Reis G, Vachharajani M, August D. RIFLE: an architectural framework for user-centric information-flow security. In: Proceedings of the 37th international symposium on microarchitecture (MICRO); December 2004.
-
Vachharajani N, Bridges M, Chang J, Rangan R, Ottoni G, Blome J, Reis G, Vachharajani M, August D. RIFLE: an architectural framework for user-centric information-flow security. In: Proceedings of the 37th international symposium on microarchitecture (MICRO); December 2004.
-
-
-
-
33
-
-
53049089626
-
-
Vogt P, Nentwich F, Jovanovic N, Kruegel C, Kirda E, Vigna G. Cross site scripting prevention with dynamic data tainting and static analysis. In: Fourteenth annual network and distributed system security symposium (NDSS 2007), San Diego, CA; February 2007.
-
Vogt P, Nentwich F, Jovanovic N, Kruegel C, Kirda E, Vigna G. Cross site scripting prevention with dynamic data tainting and static analysis. In: Fourteenth annual network and distributed system security symposium (NDSS 2007), San Diego, CA; February 2007.
-
-
-
-
34
-
-
0038011184
-
-
Wagner D, Soto P. Mimicry attacks on host-based intrusion detection systems. In: Proceedings of the ninth ACM conference on computer and communications security, Washington, D.C.; November 2002. p. 255-64.
-
Wagner D, Soto P. Mimicry attacks on host-based intrusion detection systems. In: Proceedings of the ninth ACM conference on computer and communications security, Washington, D.C.; November 2002. p. 255-64.
-
-
-
-
37
-
-
0142219252
-
An improved reference flow control model for policy-based intrusion detection
-
Eighth European symposium on research in computer security (Gjøvik, Norway), Springer-Verlag
-
Zimmermann J., Mé L., and Bidan C. An improved reference flow control model for policy-based intrusion detection. Eighth European symposium on research in computer security (Gjøvik, Norway). Lecture notes in computer science 2808 (October 2003), Springer-Verlag
-
(2003)
Lecture notes in computer science 2808
-
-
Zimmermann, J.1
Mé, L.2
Bidan, C.3
-
38
-
-
53049093057
-
-
Zimmermann J, Mé L, Bidan C. Experimenting with a policy-based HIDS based on and information flow control model. In: Nineenteenth computer security applications conference (Las Vegas); November 2003.
-
Zimmermann J, Mé L, Bidan C. Experimenting with a policy-based HIDS based on and information flow control model. In: Nineenteenth computer security applications conference (Las Vegas); November 2003.
-
-
-
|