-
4
-
-
34748845128
-
Practical taint-based protection using demand emulation
-
Leuven, Belgium, April
-
A. Ho, M. Fetterman, C. Clark, A. Warfield, and S. Hand. Practical taint-based protection using demand emulation. In EuroSys, Leuven, Belgium, April 2006.
-
(2006)
EuroSys
-
-
Ho, A.1
Fetterman, M.2
Clark, C.3
Warfield, A.4
Hand, S.5
-
5
-
-
59249106693
-
Detecting targeted attacks using shadow honeypots
-
Baltimore, MD, August
-
K. G. Anagnostakis, S. Sidiroglou, P. Akritidis, E. M. K. Xinidis, and A. D. Keromytis. Detecting targeted attacks using shadow honeypots. In Usenix Security, Baltimore, MD, August 2005.
-
(2005)
Usenix Security
-
-
Anagnostakis, K.G.1
Sidiroglou, S.2
Akritidis, P.3
Xinidis, E.M.K.4
Keromytis, A.D.5
-
6
-
-
85063636742
-
QEMU, a fast and portable dynamic translator
-
Anaheim, CA, April
-
F. Bellard. QEMU, a fast and portable dynamic translator. In Proc. of USENIX ATC, pages 41-46, Anaheim, CA, April 2005.
-
(2005)
Proc. of USENIX ATC
, pp. 41-46
-
-
Bellard, F.1
-
7
-
-
33745956039
-
Framework for instruction-level tracing and analysis of programs
-
Ottawa, Canada, June
-
S. Bhansali, W.-K. Chen, S. D. Jong, A. Edwards, and M. Drinic. Framework for instruction-level tracing and analysis of programs. In Proceedings of the 2nd International Conference on Virtual Execution Environments (VEE'06), pages 154-163, Ottawa, Canada, June 2006.
-
(2006)
Proceedings of the 2nd International Conference on Virtual Execution Environments (VEE'06)
, pp. 154-163
-
-
Bhansali, S.1
Chen, W.-K.2
Jong, S.D.3
Edwards, A.4
Drinic, M.5
-
8
-
-
84862209017
-
Address obfuscation: An efficient approach to combat a broad range of memory error exploits
-
August
-
S. Bhatkar, D. D. Varney, and R. Sekar. Address obfuscation: an efficient approach to combat a broad range of memory error exploits. In Proc. of USENIX Security, pages 105-120, August 2003.
-
(2003)
Proc. of USENIX Security
, pp. 105-120
-
-
Bhatkar, S.1
Varney, D.D.2
Sekar, R.3
-
9
-
-
33751056900
-
Towards automatic generation of vulnerability-based signatures
-
Oakland, CA, May
-
D. Brumley, J. Newsome, D. Song, H. Wang, and S. Jha. Towards automatic generation of vulnerability-based signatures. In Security and Privacy, Oakland, CA, May 2006.
-
(2006)
Security and Privacy
-
-
Brumley, D.1
Newsome, J.2
Song, D.3
Wang, H.4
Jha, S.5
-
10
-
-
85009448253
-
-
C. Cowan, S. Beattie, J. Johansen and P. Wagle. PointGuard: Protecting pointers from buffer overflow vulnerabilities. In In Proc. of the 12th USENIX Security Symposium, pages 91-104, August 2003.
-
C. Cowan, S. Beattie, J. Johansen and P. Wagle. PointGuard: Protecting pointers from buffer overflow vulnerabilities. In In Proc. of the 12th USENIX Security Symposium, pages 91-104, August 2003.
-
-
-
-
12
-
-
47149094631
-
StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks
-
San Francisco, CA
-
Crispin Cowan, Calton Pu, Dave Maier, Heather Hintony, Jonathan Walpole, Peat Bakke, Steve Beattie, Aaron Grier, PerryWagle and Qian Zhang. StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks, In 7th USENIX Security Symposium, San Francisco, CA, 2002.
-
(2002)
7th USENIX Security Symposium
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Hintony, H.4
Walpole, J.5
Bakke, P.6
Beattie, S.7
Aaron Grier, P.8
Zhang, Q.9
-
13
-
-
78249251033
-
Protocol-independent adaptive replay of application dialog
-
San Diego, CA, February
-
W. Cui, V. Paxson, N. Weaver, and R. Katz. Protocol-independent adaptive replay of application dialog. In The 13th Annual Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 2006.
-
(2006)
The 13th Annual Network and Distributed System Security Symposium (NDSS)
-
-
Cui, W.1
Paxson, V.2
Weaver, N.3
Katz, R.4
-
14
-
-
33750307577
-
Safecard: A gigabit ips on the network card
-
Hamburg, Germany, September
-
W. de Bruijn, A. Slowinska, K. van Reeuwijk, T. Hruby, L. Xu, and H. Bos. Safecard: a gigabit ips on the network card. In Proceedings of 9th International Symposium on Recent Advances in Intrusion Detection (RAID'06), pages 311-330, Hamburg, Germany, September 2006.
-
(2006)
Proceedings of 9th International Symposium on Recent Advances in Intrusion Detection (RAID'06)
, pp. 311-330
-
-
de Bruijn, W.1
Slowinska, A.2
van Reeuwijk, K.3
Hruby, T.4
Xu, L.5
Bos, H.6
-
15
-
-
0016949746
-
A lattice model of secure information flow
-
D. Denning. A lattice model of secure information flow. ACM Transactions on Communications, 19(5):236-243, 1976.
-
(1976)
ACM Transactions on Communications
, vol.19
, Issue.5
, pp. 236-243
-
-
Denning, D.1
-
16
-
-
59249103779
-
-
eEye. eeye industry newsletter. http://www.eeye.com/html/resources/ newsletters/versa/VE20070516.html#techtal%k, May 2007.
-
eEye. eeye industry newsletter. http://www.eeye.com/html/resources/ newsletters/versa/VE20070516.html#techtal%k, May 2007.
-
-
-
-
17
-
-
0043199887
-
Characteristics of i/o traffic in personal computer and server workloads
-
W. W. Hsu and A. J. Smith. Characteristics of i/o traffic in personal computer and server workloads. IBM Systems Journal, 42(2), 2003.
-
(2003)
IBM Systems Journal
, vol.42
, Issue.2
-
-
Hsu, W.W.1
Smith, A.J.2
-
18
-
-
14844317200
-
Countering code-injection attacks with instruction-set randomization
-
Washington, DC, October
-
G. S. Kc, A. D. Keromytis, and V. Prevelakis. Countering code-injection attacks with instruction-set randomization. In Proc. of the ACM Computer and Communications Security (CCS), pages 272-280, Washington, DC, October 2003.
-
(2003)
Proc. of the ACM Computer and Communications Security (CCS)
, pp. 272-280
-
-
Kc, G.S.1
Keromytis, A.D.2
Prevelakis, V.3
-
19
-
-
2342615538
-
Anti-honeypot technology
-
January
-
N. Krawetz. Anti-honeypot technology. IEEE Security and Privacy, 2(1):76-79, January 2004.
-
(2004)
IEEE Security and Privacy
, vol.2
, Issue.1
, pp. 76-79
-
-
Krawetz, N.1
-
20
-
-
59249091564
-
Accountability and freedom
-
Cambridge, UK, October
-
B. Lampson. Accountability and freedom. In Cambridge Computer Seminar, Cambridge, UK, October 2005.
-
(2005)
Cambridge Computer Seminar
-
-
Lampson, B.1
-
21
-
-
33750320499
-
Automatic handling of protocol dependencies and reaction to 0-day attacks with scriptgen based honeypots
-
Hamburg, Germany, September
-
C. Leita, M. Dacier, and F. Massicotte. Automatic handling of protocol dependencies and reaction to 0-day attacks with scriptgen based honeypots. In Proceedings of RAID'06, pages 185-205, Hamburg, Germany, September 2006.
-
(2006)
Proceedings of RAID'06
, pp. 185-205
-
-
Leita, C.1
Dacier, M.2
Massicotte, F.3
-
22
-
-
33745673185
-
Application communities: Using monoculture for dependability
-
Yokohama, Japan, June
-
M. E. Locasto, S. Sidiroglou, and A. D. Keromytis. Application communities: Using monoculture for dependability. In Proceedings of the 1st Workshop on Hot Topics in System Dependability (HotDep), pages 288-292, Yokohama, Japan, June 2005.
-
(2005)
Proceedings of the 1st Workshop on Hot Topics in System Dependability (HotDep)
, pp. 288-292
-
-
Locasto, M.E.1
Sidiroglou, S.2
Keromytis, A.D.3
-
23
-
-
59249094964
-
From stem to sead: Speculative execution for automated defense
-
June
-
M. E. Locasto, A. Stavrou, G. F. Cretu, and A. D. Keromytis. From stem to sead: Speculative execution for automated defense. In Proceedings of the 2007 USENIX Annual Technical Conference, pages 219-232, June 2007.
-
(2007)
Proceedings of the 2007 USENIX Annual Technical Conference
, pp. 219-232
-
-
Locasto, M.E.1
Stavrou, A.2
Cretu, G.F.3
Keromytis, A.D.4
-
24
-
-
33845391802
-
-
Proc. of the 20th ACM Symposium on Operating Systems Principles SOSP, Brighton, UK, October
-
M. Costa, J. Crowcroft, M. Castro, A Rowstron, L. Zhou, L. Zhang and P. Barham. Vigilante: End-to-end containment of internet worms. In In Proc. of the 20th ACM Symposium on Operating Systems Principles (SOSP), Brighton, UK, October 2005.
-
(2005)
Vigilante: End-to-end containment of internet worms
-
-
Costa, M.1
Crowcroft, J.2
Castro, M.3
Rowstron, A.4
Zhou, L.5
Zhang, L.6
Barham, P.7
-
26
-
-
34547349153
-
Replayer: Automatic protocol replay by binary analysis
-
New York, NY, USA, ACM Press
-
J. Newsome, D. Brumley, J. Franklin, and D. Song. Replayer: automatic protocol replay by binary analysis. In CCS'06: Proceedings of the 13th ACM conference on Computer and communications security, pages 311-321, New York, NY, USA, 2006. ACM Press.
-
(2006)
CCS'06: Proceedings of the 13th ACM conference on Computer and communications security
, pp. 311-321
-
-
Newsome, J.1
Brumley, D.2
Franklin, J.3
Song, D.4
-
29
-
-
59249084067
-
Load your 32-bit dll into another process's address space using injlib
-
January
-
J. Richter. Load your 32-bit dll into another process's address space using injlib. Microsoft Systems Journal (MSJ), January 1996.
-
(1996)
Microsoft Systems Journal (MSJ)
-
-
Richter, J.1
-
31
-
-
14844328033
-
On the effectiveness of address-space randomization
-
ACM
-
H. Shacham, M. Page, B. Pfaff, E. Goh, and N. Modadugu. On the effectiveness of address-space randomization. In Proceedings of the 11th ACM conference on Computer and communications security, pages 298-307. ACM, 2004.
-
(2004)
Proceedings of the 11th ACM conference on Computer and communications security
, pp. 298-307
-
-
Shacham, H.1
Page, M.2
Pfaff, B.3
Goh, E.4
Modadugu, N.5
-
33
-
-
48649093823
-
The age of data: Pinpointing guilty bytes in polymorphic buffer overflows on heap or stack
-
Miami, FLA, December
-
A. Slowinska and H. Bos. The age of data: pinpointing guilty bytes in polymorphic buffer overflows on heap or stack. In 23rd Annual Computer Security Applications Conference (ACSAC'07), Miami, FLA, December 2007.
-
(2007)
23rd Annual Computer Security Applications Conference (ACSAC'07)
-
-
Slowinska, A.1
Bos, H.2
-
34
-
-
59249098978
-
-
P. Szor and P. Ferrie. Hunting for metamorphic. In Virus Bulletin Conference, pages 123-144, Abingdon, Oxfordshire, England, September 2001.
-
P. Szor and P. Ferrie. Hunting for metamorphic. In Virus Bulletin Conference, pages 123-144, Abingdon, Oxfordshire, England, September 2001.
-
-
-
-
35
-
-
41149086696
-
Sweeper: A light-weight end-to-end system for defending against fast worms
-
Lisbon, Portugal, April
-
J. Tucek, S. Lu, C. Luang, S. Xanthos, Y. Zhou, J. Newsome, D. Brunmley, and D. Song. Sweeper: a light-weight end-to-end system for defending against fast worms. In Proceedings of Eurosys 2007, Lisbon, Portugal, April 2007.
-
(2007)
Proceedings of Eurosys 2007
-
-
Tucek, J.1
Lu, S.2
Luang, C.3
Xanthos, S.4
Zhou, Y.5
Newsome, J.6
Brunmley, D.7
Song, D.8
-
36
-
-
34547261222
-
Packet vaccine: Black-box exploit detection and signature generatio n
-
New York, NY, USA, ACM Press
-
X. Wang, Z., Li, J. Xu, M. K. Reiter, C. Kil, and J. Y. Choi. Packet vaccine: black-box exploit detection and signature generatio n. In CCS'06: Proceedings of the 13th ACM conference on Computer and communications security, pages 37-46, New York, NY, USA, 2006. ACM Press.
-
(2006)
CCS'06: Proceedings of the 13th ACM conference on Computer and communications security
, pp. 37-46
-
-
Wang, X.1
Li, Z.2
Xu, J.3
Reiter, M.K.4
Kil, C.5
Choi, J.Y.6
-
37
-
-
84904088330
-
Automated web patrol with strider honeymonkeys: Finding web sites that exploit browser vulnerabilities
-
San Diego, CA, February
-
Y.-M. Wang, D. Beck, X. Jiang, R. Roussev, C. Verbowski, S. Chen, and S. King. Automated web patrol with strider honeymonkeys: Finding web sites that exploit browser vulnerabilities. In Proc. Network and Distributed System Security (NDSS), San Diego, CA, February 2006.
-
(2006)
Proc. Network and Distributed System Security (NDSS)
-
-
Wang, Y.-M.1
Beck, D.2
Jiang, X.3
Roussev, R.4
Verbowski, C.5
Chen, S.6
King, S.7
|