-
1
-
-
34548708575
-
Lurking in the shadows: Identifying systemic threats to kernel data
-
Oakland, CA May
-
Baliga, A., Kamat, P., Iftode, L.: Lurking in the shadows: Identifying systemic threats to kernel data. In: IEEE Symposium on Security and Privacy, Oakland, CA (May 2007)
-
(2007)
IEEE Symposium on Security and Privacy
-
-
Baliga, A.1
Kamat, P.2
Iftode, L.3
-
2
-
-
56549088996
-
Xen and the art of virtualization
-
NY October
-
th ACM Symposium on Operating Systems Principles (SOSP), Bolton Landing, NY (October 2003)
-
(2003)
th ACM Symposium on Operating Systems Principles (SOSP), Bolton Landing
-
-
Barbara, P.1
Dragovic, B.2
Eraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Warfield, A.9
-
4
-
-
56549124993
-
Siren: Catching evasive malware
-
Oakland, CA May
-
Borders, K., Zhao, X., Prakash, A.: Siren: Catching evasive malware. In: IEEE Symposium on Security and Privacy, Oakland, CA (May 2005)
-
(2005)
IEEE Symposium on Security and Privacy
-
-
Borders, K.1
Zhao, X.2
Prakash, A.3
-
5
-
-
56549091385
-
-
CERT. TCP SYN Flooding and IP Spoofing Attacks. CERT Advisory CS-1996-21 (Last accessed April 4, 2008), http://www.cert.org/advisories/CA-1996-21.html
-
CERT. TCP SYN Flooding and IP Spoofing Attacks. CERT Advisory CS-1996-21 (Last accessed April 4, 2008), http://www.cert.org/advisories/CA-1996-21.html
-
-
-
-
6
-
-
56549085134
-
-
Check Point. ZoneAlarm (Last accessed April 4, 2008), http://www.zonealarm.com/store/content/home.jsp
-
Check Point. ZoneAlarm (Last accessed April 4, 2008), http://www.zonealarm.com/store/content/home.jsp
-
-
-
-
7
-
-
56549089345
-
-
Community Developers. Ebtables (Last accessed November 1, 2007), http://ebtables.sourceforge.net/
-
Community Developers. Ebtables (Last accessed November 1, 2007), http://ebtables.sourceforge.net/
-
-
-
-
8
-
-
56549095702
-
-
Community Developers. Tripwire (Last accessed November 1, 2007), http://sourceforge.net/projects/tripwire/
-
Community Developers. Tripwire (Last accessed November 1, 2007), http://sourceforge.net/projects/tripwire/
-
-
-
-
9
-
-
21644455412
-
Terra: A virtual machine-based platform for trusted computing
-
NY
-
Garfinkel, T., Pfaff, B., Chow, J., Rosenblum, M., Boneh, D.: Terra: A virtual machine-based platform for trusted computing. In: ACM Symposium on Operating Systems Principles (SOSP), October 2003, Bolton Landing, NY (2003)
-
(2003)
ACM Symposium on Operating Systems Principles (SOSP), October 2003, Bolton Landing
-
-
Garfinkel, T.1
Pfaff, B.2
Chow, J.3
Rosenblum, M.4
Boneh, D.5
-
10
-
-
85080362568
-
A virtual machine introspection based architecture for intrusion detection
-
Garfinkel, T., Rosenblum, M.: A virtual machine introspection based architecture for intrusion detection. In: Network and Distributed System Security Symposium (NDSS), San Diego, CA, Feburary (2003)
-
(2003)
Network and Distributed System Security Symposium (NDSS), San Diego, CA, Feburary
-
-
Garfinkel, T.1
Rosenblum, M.2
-
11
-
-
78650880166
-
Flexible OS support and applications for trusted computing
-
HOTOS, Lihue, HI May
-
Garfinkel, T., Rosenblum, M., Boneh, D.: Flexible OS support and applications for trusted computing. In: 9th Hot Topics in Operating Systems (HOTOS), Lihue, HI (May 2003)
-
(2003)
9th Hot Topics in Operating Systems
-
-
Garfinkel, T.1
Rosenblum, M.2
Boneh, D.3
-
12
-
-
56549083366
-
-
Oskoboiny, G.: Whiteiist-based spam filtering (Last accessed April 4, 2008), http://impressive.net/people/gerald/2000/12/spam-filtering.html
-
Oskoboiny, G.: Whiteiist-based spam filtering (Last accessed April 4, 2008), http://impressive.net/people/gerald/2000/12/spam-filtering.html
-
-
-
-
13
-
-
56549092355
-
-
Grok. Coromputer Dunno (Last accessed April 4, 2008), http://lists.grok.org.uk/pipermail/full-disclosure/attacnments/20070911/ 87396911/attachment-0001.txt
-
Grok. Coromputer Dunno (Last accessed April 4, 2008), http://lists.grok.org.uk/pipermail/full-disclosure/attacnments/20070911/ 87396911/attachment-0001.txt
-
-
-
-
14
-
-
56549127327
-
-
Honeynet Project. Q8 (Last accessed April 4, 2008), http://www.honeynet. org/papers/bots/
-
Honeynet Project. Q8 (Last accessed April 4, 2008), http://www.honeynet. org/papers/bots/
-
-
-
-
15
-
-
0034449536
-
Implementing a distributed firewall
-
Athens, Greece November
-
loannidis, S., Keromytis, A., Bellovin, S., Smith, J.: Implementing a distributed firewall. In: ACM Conference on Computer and Communications Security (CCS), Athens, Greece (November 2000)
-
(2000)
ACM Conference on Computer and Communications Security (CCS)
-
-
loannidis, S.1
Keromytis, A.2
Bellovin, S.3
Smith, J.4
-
16
-
-
38149053957
-
-
Jiang, X., Wang, X.: Out-of-the-box monitoring of VM-based high-interaction honeypots. In: Kruegel, C., Lippmann, R., Clark, A. (eds.) RAID 2007. LNCS, 4637, pp. 198-218. Springer, Heidelberg (2007)
-
Jiang, X., Wang, X.: Out-of-the-box monitoring of VM-based high-interaction honeypots. In: Kruegel, C., Lippmann, R., Clark, A. (eds.) RAID 2007. LNCS, vol. 4637, pp. 198-218. Springer, Heidelberg (2007)
-
-
-
-
18
-
-
56549099301
-
-
LKCD Project. LKCD - Linux Kernel Crash Dump (Last accessed April 4, 2008), http://lkcd.sourceforge.net/
-
LKCD Project. LKCD - Linux Kernel Crash Dump (Last accessed April 4, 2008), http://lkcd.sourceforge.net/
-
-
-
-
20
-
-
56549117543
-
-
b, Last accessed April 4
-
McAfee. BackDoor-Rev.b. (Last accessed April 4. 2008), http://vil.nai.com/vil/Content/v_136510.htm
-
(2008)
-
-
McAfee1
BackDoor-Rev2
-
21
-
-
85028466841
-
The packet filter: An efficient mechanism for user-level network code
-
Austin, TX November
-
Mogul, J., Rashid, R., Accetta, M.: The packet filter: An efficient mechanism for user-level network code. In: ACM Symposium on Operating Systems Principles (SOSP), Austin, TX (November 1987)
-
(1987)
ACM Symposium on Operating Systems Principles (SOSP)
-
-
Mogul, J.1
Rashid, R.2
Accetta, M.3
-
22
-
-
56549124007
-
-
Packet Storm (Last accessed April 4, 2008), http://packetstormsecurity. org/UNIX/penetration/rootkits/bdoor.c.blackhole.c,cheetah,c,server.c,ovasOn.c
-
Packet Storm (Last accessed April 4, 2008), http://packetstormsecurity. org/UNIX/penetration/rootkits/bdoor.c.blackhole.c,cheetah,c,server.c,ovasOn.c
-
-
-
-
23
-
-
56549106372
-
-
Packet Storm (Last accessed April 4, 2008), http://packetstormsecurity. org/0209-exploits/apache-ssl-bug.c, apache-lirtux.txt
-
Packet Storm (Last accessed April 4, 2008), http://packetstormsecurity. org/0209-exploits/apache-ssl-bug.c, apache-lirtux.txt
-
-
-
-
24
-
-
56549130437
-
-
Packet Storm. Kaiten (Last accessed April 4, 2008), http:// packetstormsecurity.org/irc/kaiten.c
-
Packet Storm. Kaiten (Last accessed April 4, 2008), http:// packetstormsecurity.org/irc/kaiten.c
-
-
-
-
25
-
-
48649085344
-
-
rd Annual Computer Security Applications Conference (ACSAC), Miami, FL (December 2007)
-
rd Annual Computer Security Applications Conference (ACSAC), Miami, FL (December 2007)
-
-
-
-
28
-
-
85069458084
-
Splitting interfaces: Making trust between applications and operating systems configurable
-
Seattle, WA October
-
Ta-Min, R., Litty, L., Lie, D.: Splitting interfaces: Making trust between applications and operating systems configurable. In: Symposium on Operating System Design and Implementation (OSDI), Seattle, WA (October 2006)
-
(2006)
Symposium on Operating System Design and Implementation (OSDI)
-
-
Ta-Min, R.1
Litty, L.2
Lie, D.3
-
29
-
-
85077745984
-
TCP wrapper: Network monitoring, access control and booby traps
-
Baltimore, MD September
-
Venema, W.: TCP wrapper: Network monitoring, access control and booby traps. In: USENIX UNIX Security Symposium, Baltimore, MD (September 1992)
-
(1992)
USENIX UNIX Security Symposium
-
-
Venema, W.1
-
30
-
-
67650081621
-
Constructing services with interposable virtual hardware
-
San Francisco, CA March
-
Whitaker, A., Cox, R.S., Shaw, M., Gribble, S.D.: Constructing services with interposable virtual hardware. In: 1st Symposium on Networked Systems Design and Implementation (NSDI), San Francisco, CA (March 2004)
-
(2004)
1st Symposium on Networked Systems Design and Implementation (NSDI)
-
-
Whitaker, A.1
Cox, R.S.2
Shaw, M.3
Gribble, S.D.4
-
31
-
-
56549101045
-
-
XenAccess Project. XenAccess Library (Last accessed April 4, 2008), http://xenaccess.sourceforge.net/
-
XenAccess Project. XenAccess Library (Last accessed April 4, 2008), http://xenaccess.sourceforge.net/
-
-
-
-
32
-
-
34548043501
-
Towards a VMM-based usage control framework for OS kernel integrity protection
-
Sophia Antipolis, France June
-
Xu, M., Jiang, X., Sandhu, R., Zhang, X.: Towards a VMM-based usage control framework for OS kernel integrity protection. In: 12th ACM Symposium on Access Control Models and Technologies (SACMAT), Sophia Antipolis, France (June 2007)
-
(2007)
12th ACM Symposium on Access Control Models and Technologies (SACMAT)
-
-
Xu, M.1
Jiang, X.2
Sandhu, R.3
Zhang, X.4
-
33
-
-
77950788046
-
Panorama: Capturing systemwide information flow for malware detection and analysis
-
Arlington, VA October
-
Yin, H., Song, D., Egele, M., Kruegel, C., Kirda, E.: Panorama: Capturing systemwide information flow for malware detection and analysis. In: ACM Conference on Computer and Communications Security (CCS), Arlington, VA (October 2007)
-
(2007)
ACM Conference on Computer and Communications Security (CCS)
-
-
Yin, H.1
Song, D.2
Egele, M.3
Kruegel, C.4
Kirda, E.5
|