-
1
-
-
58449136154
-
-
CVC Lite documentation (Page checked 7/26/2008), http://www.cs.nyu.edu/ acsys/cvcl/doc/
-
CVC Lite documentation (Page checked 7/26/2008), http://www.cs.nyu.edu/ acsys/cvcl/doc/
-
-
-
-
2
-
-
84868867342
-
-
The DOT language Page checked 7/26
-
The DOT language (Page checked 7/26/2008), http://www.graphviz.org/doc/ info/lang.html
-
(2008)
-
-
-
3
-
-
58449095476
-
-
On the run - building dynamic modifiers for optimization, detection, and security. Original DynamoRIO announcement via PLDI tutorial (June 2002)
-
On the run - building dynamic modifiers for optimization, detection, and security. Original DynamoRIO announcement via PLDI tutorial (June 2002)
-
-
-
-
4
-
-
58449083407
-
-
ARM. ARM Architecture Reference Manual (2005) Doc. No. DDI-0100I
-
ARM. ARM Architecture Reference Manual (2005) Doc. No. DDI-0100I
-
-
-
-
5
-
-
47249123725
-
-
PhD thesis, Computer Science Department, University of Wisconsin at Madison August
-
Balakrishnan, G.: WYSINWYX: What You See Is Not What You eXecute. PhD thesis, Computer Science Department, University of Wisconsin at Madison (August 2007)
-
(2007)
WYSINWYX: What You See Is Not What You eXecute
-
-
Balakrishnan, G.1
-
6
-
-
24644506256
-
-
Balakrishnan, G., Gruian, R., Reps, T, Teitelbaum, T: Codesurfer/x86 - a platform for analyzing x86 executables. In: Proceedings of the International Conference on Compiler Construction (April 2005)
-
Balakrishnan, G., Gruian, R., Reps, T, Teitelbaum, T: Codesurfer/x86 - a platform for analyzing x86 executables. In: Proceedings of the International Conference on Compiler Construction (April 2005)
-
-
-
-
7
-
-
85077688456
-
Towards automatic discovery of deviations in binary implementations with applications to error detection and fingerprint generation
-
Boston, MA August
-
Brumley, D., Caballero, J., Liang, Z., Newsome, L, Song, D.: Towards automatic discovery of deviations in binary implementations with applications to error detection and fingerprint generation. In: Proceedings of the USENIX Security Symposium, Boston, MA (August 2007)
-
(2007)
Proceedings of the USENIX Security Symposium
-
-
Brumley, D.1
Caballero, J.2
Liang, Z.3
Newsome, L.4
Song, D.5
-
8
-
-
58449115871
-
Bitscope: Automatically dissecting malicious binaries
-
Technical Report CS-07-133, School of Computer Science, Carnegie Mellon University March
-
Brumley, D., Hartwig, C, Kang, M.G., Liang, Z., Newsome, J., Poosankam, P., Song, D.: Bitscope: Automatically dissecting malicious binaries. Technical Report CS-07-133, School of Computer Science, Carnegie Mellon University (March 2007)
-
(2007)
-
-
Brumley, D.1
Hartwig, C.2
Kang, M.G.3
Liang, Z.4
Newsome, J.5
Poosankam, P.6
Song, D.7
-
9
-
-
84882738195
-
-
Brumley, D., Hartwig, C, Liang, Z., Newsome, J., Poosankam, P., Song, D., Yin, H.: Automatically identifying trigger-based behavior in malware. In: Lee, W. Wang, C, Dagon, D. (eds.) Botnet Detection. Countering the Largest Security Threat Series: Advances in Information Security, 36, Springer, Heidelberg (2008)
-
Brumley, D., Hartwig, C, Liang, Z., Newsome, J., Poosankam, P., Song, D., Yin, H.: Automatically identifying trigger-based behavior in malware. In: Lee, W. Wang, C, Dagon, D. (eds.) Botnet Detection. Countering the Largest Security Threat Series: Advances in Information Security, vol. 36, Springer, Heidelberg (2008)
-
-
-
-
10
-
-
58449119017
-
-
Brumley, D., Hartwig, C, Liang, Z., Newsome, L, Song, D., Yin, H.: Towards automatically identifying trigger-based behavior in malware using symbolic execution and binary analysis. Technical Report CMU-CS-07-105, Carnegie Mellon University School of Computer Science (January 2007)
-
Brumley, D., Hartwig, C, Liang, Z., Newsome, L, Song, D., Yin, H.: Towards automatically identifying trigger-based behavior in malware using symbolic execution and binary analysis. Technical Report CMU-CS-07-105, Carnegie Mellon University School of Computer Science (January 2007)
-
-
-
-
11
-
-
33751056900
-
Towards automatic generation of vulnerability-based signatures
-
Brumley, D., Newsome, J., Song, D., Wang, H., Jha, S.: Towards automatic generation of vulnerability-based signatures. In: Proceedings of the 2006 IEEE Symposium on Security and Privacy, pp. 2-16 (2006)
-
(2006)
Proceedings of the 2006 IEEE Symposium on Security and Privacy
, pp. 2-16
-
-
Brumley, D.1
Newsome, J.2
Song, D.3
Wang, H.4
Jha, S.5
-
12
-
-
50249085491
-
Automatic patch-based exploit generation is possible: Techniques and implications
-
Brumley, D., Poosankam, P., Song, D., Zheng, J.: Automatic patch-based exploit generation is possible: Techniques and implications. In: Proceedings of the 2008 IEEE Symposium on Security and Privacy (2008)
-
(2008)
Proceedings of the 2008 IEEE Symposium on Security and Privacy
-
-
Brumley, D.1
Poosankam, P.2
Song, D.3
Zheng, J.4
-
13
-
-
35048885595
-
-
Brumley, D., Wang, H., Jha, S., Song, D.: Creating vulnerability signatures using weakest pre-conditions. In: Proceedings of Computer Security Foundations Symposium (July 2007)
-
Brumley, D., Wang, H., Jha, S., Song, D.: Creating vulnerability signatures using weakest pre-conditions. In: Proceedings of Computer Security Foundations Symposium (July 2007)
-
-
-
-
14
-
-
77952403312
-
Polyglot: Automatic extraction of protocol message format using dynamic binary analysis
-
October
-
Caballero, J., Yin, H., Liang, Z., Song, D.: Polyglot: Automatic extraction of protocol message format using dynamic binary analysis. In: Proceedings of the 14th ACM Conferences on Computer and Communication Security (CCS 2007) (October 2007)
-
(2007)
Proceedings of the 14th ACM Conferences on Computer and Communication Security (CCS
-
-
Caballero, J.1
Yin, H.2
Liang, Z.3
Song, D.4
-
15
-
-
77952403312
-
-
Caballero, J., Yin, H., Liang, Z., Song, D.: Polyglot: Automatic extraction of protocol message format using dynamic binary analysis. In: Proceedings of the ACM Conference on Computer and Communications Security (October 2007)
-
Caballero, J., Yin, H., Liang, Z., Song, D.: Polyglot: Automatic extraction of protocol message format using dynamic binary analysis. In: Proceedings of the ACM Conference on Computer and Communications Security (October 2007)
-
-
-
-
16
-
-
85084160792
-
Understanding data lifetime via whole system simulation
-
August
-
Chow, J., Pfaff, B., Garfinkel, T., Christopher, K., Rosenblum, M.: Understanding data lifetime via whole system simulation. In: Proceedings of the 13th USENIX Security Symposium (Security 2004) (August 2004)
-
(2004)
Proceedings of the 13th USENIX Security Symposium (Security
-
-
Chow, J.1
Pfaff, B.2
Garfinkel, T.3
Christopher, K.4
Rosenblum, M.5
-
17
-
-
84885679117
-
-
Costa, M., Crowcroft, J., Castro, M., Rowstron, A., Zhou, L., Zhang, L., Barham P.: Vigilante: End-to-end containment of internet worms. In: In Proceedings of the Symposium on Systems and Operating Systems Principles (SOSP 2005) (2005)
-
Costa, M., Crowcroft, J., Castro, M., Rowstron, A., Zhou, L., Zhang, L., Barham P.: Vigilante: End-to-end containment of internet worms. In: In Proceedings of the Symposium on Systems and Operating Systems Principles (SOSP 2005) (2005)
-
-
-
-
19
-
-
58449088874
-
-
DataRescue. IDA Pro. (Page checked 7/31/2008), http:/ /www.datarescue.com
-
DataRescue. IDA Pro. (Page checked 7/31/2008), http:/ /www.datarescue.com
-
-
-
-
21
-
-
58449091060
-
-
Ganesh, V., Dill, D.: STP: A decision procedure for bitvectors and arrays, http://theory.Stanford,edu/-vganesh/stp
-
Ganesh, V., Dill, D.: STP: A decision procedure for bitvectors and arrays, http://theory.Stanford,edu/-vganesh/stp
-
-
-
-
22
-
-
58449096546
-
-
Ganesh. V., Dill. D.L.: A decision procedure for bit-vectors and arrays. In: Damm, W., Hermanns, H. (eds.) CAV 2007. LNCS, 4590, pp. 524-536. Springer, Heidelberg (2007)
-
Ganesh. V., Dill. D.L.: A decision procedure for bit-vectors and arrays. In: Damm, W., Hermanns, H. (eds.) CAV 2007. LNCS, vol. 4590, pp. 524-536. Springer, Heidelberg (2007)
-
-
-
-
24
-
-
58449089642
-
-
Jackson, D., Rollins, E.J.: Chopping: A generalization of slicing. Technical Report CS-94-169, Carnegie Mellon University School of Computer Science (1994)
-
Jackson, D., Rollins, E.J.: Chopping: A generalization of slicing. Technical Report CS-94-169, Carnegie Mellon University School of Computer Science (1994)
-
-
-
-
26
-
-
85084160818
-
Static disassembly of obfuscated binaries
-
Kruegel, C, Robertson, W., Valeur, F., Vigna, G.: Static disassembly of obfuscated binaries. In: Proceedings of the USENIX Security Symposium (2004)
-
(2004)
Proceedings of the USENIX Security Symposium
-
-
Kruegel, C.1
Robertson, W.2
Valeur, F.3
Vigna, G.4
-
27
-
-
31944440969
-
-
Luk, C.-K., Cohn, R. Muth, R., Patil, H. Klauser, A., Lowney, G., Wallace, S., Reddi, V.J., Hazelwood, K.: Pin: Building customized program analysis tools with dynamic instrumentation. In: Proceedings of the ACM Conference on Programming Language Design and Implementation (June 2005)
-
Luk, C.-K., Cohn, R. Muth, R., Patil, H. Klauser, A., Lowney, G., Wallace, S., Reddi, V.J., Hazelwood, K.: Pin: Building customized program analysis tools with dynamic instrumentation. In: Proceedings of the ACM Conference on Programming Language Design and Implementation (June 2005)
-
-
-
-
28
-
-
58449096853
-
-
Microsoft. Phoenix framework (Paged checked 7/31/2008), http://research.microsoft.com/phoenix/
-
Microsoft. Phoenix framework (Paged checked 7/31/2008), http://research.microsoft.com/phoenix/
-
-
-
-
29
-
-
58449115293
-
-
Microsoft. Phoenix project architect posting (Page checked 7/31/2008) (July 2008), http://forums.msdn.microsoft.com/en-US/phoenix/thread/ 90f5212c-05a-4aea-9a8f-a5840a6dl01d
-
Microsoft. Phoenix project architect posting (Page checked 7/31/2008) (July 2008), http://forums.msdn.microsoft.com/en-US/phoenix/thread/ 90f5212c-05a-4aea-9a8f-a5840a6dl01d
-
-
-
-
32
-
-
34547349153
-
Replayer: Automatic protocol replay by binary analysis
-
Write, R, De Capitani di Vimercati, S, Shmatikov, V, eds
-
Newsome, J., Brumley, D., Franklin, J., Song, D.: Replayer: Automatic protocol replay by binary analysis. In: Write, R., De Capitani di Vimercati, S., Shmatikov, V. (eds.) Proceedings of the ACM Conference on Computer and Communications Security, pp. 311-321 (2006)
-
(2006)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 311-321
-
-
Newsome, J.1
Brumley, D.2
Franklin, J.3
Song, D.4
-
33
-
-
58449099787
-
-
Newsome, J., Brumley, D., Song, D.: Sting: An end-to-end self-healing system for defending against zero-day worm attacks. Technical Report CMU-CS-05-191, Carnegie Mellon University School of Computer Science (2006)
-
Newsome, J., Brumley, D., Song, D.: Sting: An end-to-end self-healing system for defending against zero-day worm attacks. Technical Report CMU-CS-05-191, Carnegie Mellon University School of Computer Science (2006)
-
-
-
-
34
-
-
34548729485
-
Vulnerability-specific execution filtering for exploit prevention on commodity software
-
Newsome, J., Brumley, D., Song, D.: Vulnerability-specific execution filtering for exploit prevention on commodity software. In: Proceedings of the 13th Annual Network and Distributed Systems Security Symposium, NDSS (2006)
-
(2006)
Proceedings of the 13th Annual Network and Distributed Systems Security Symposium, NDSS
-
-
Newsome, J.1
Brumley, D.2
Song, D.3
-
36
-
-
84868875459
-
-
Qemu,http://fabrice.bellard.free.fr/qemu/
-
Qemu
-
-
-
37
-
-
0005238772
-
-
PhD thesis, Rice University Department of Computer Science
-
Simpson, L.T.: Value-Driven Redundancy Elimination. PhD thesis, Rice University Department of Computer Science (1996)
-
(1996)
Value-Driven Redundancy Elimination
-
-
Simpson, L.T.1
-
38
-
-
12844267418
-
Secure program execution via dynamic information flow tracking
-
October
-
Suh, G.E., Lee, J.W., Zhang, D., Devadas, S.: Secure program execution via dynamic information flow tracking. In: Proceedings of the 11th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS 2004) (October 2004)
-
(2004)
Proceedings of the 11th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS
-
-
Suh, G.E.1
Lee, J.W.2
Zhang, D.3
Devadas, S.4
-
39
-
-
58449118118
-
-
Tridgell. A.: How samba was written (Checked on 8/21/2008) (August 2003). http://www.samba.org/ftp/tridge/misc/french-cafe . txt
-
Tridgell. A.: How samba was written (Checked on 8/21/2008) (August 2003). http://www.samba.org/ftp/tridge/misc/french-cafe . txt
-
-
-
-
40
-
-
41149086696
-
Sweeper: A lightweight end-to-end system for defending against fast worms
-
Tucek, J., Newsome, J., Lu, S., Huang, C, Xanthos, S., Brumley, D., Zhou, Y., Song, D.: Sweeper: A lightweight end-to-end system for defending against fast worms. In: Proceedings of the EuroSys Conference (2007)
-
(2007)
Proceedings of the EuroSys Conference
-
-
Tucek, J.1
Newsome, J.2
Lu, S.3
Huang, C.4
Xanthos, S.5
Brumley, D.6
Zhou, Y.7
Song, D.8
-
41
-
-
84868876618
-
-
Valgrind, http :/ /valgrind.org
-
Valgrind
-
-
-
43
-
-
77950788046
-
Panorama: Capturing system-wide information flow for malware detection and analysis
-
October
-
Yin, H., Song, D., Manuel, E., Kruegel, C, Kirda, E.: Panorama: Capturing system-wide information flow for malware detection and analysis. In: Proceedings of the 14th ACM Conferences on Computer and Communication Security (CCS 2007) (October 2007)
-
(2007)
Proceedings of the 14th ACM Conferences on Computer and Communication Security (CCS
-
-
Yin, H.1
Song, D.2
Manuel, E.3
Kruegel, C.4
Kirda, E.5
|