-
1
-
-
85077534085
-
-
i-Bench. http://http://www.veritest.com/ benchmarks/i- bench/default.asp
-
i-Bench. http://http://www.veritest.com/ benchmarks/i- bench/default.asp.
-
-
-
-
2
-
-
85077525615
-
Using network-based application recognition and access control lists for blocking thecode red
-
Technical report, Cisco Systems, Inc
-
Using Network-Based Application Recognition and Access Control Lists for Blocking the”Code Red” Worm at Network Ingress Points. Technical report, Cisco Systems, Inc.
-
Worm at Network Ingress Points
-
-
-
10
-
-
0242624600
-
Met: An experimental system for malicious email tracking
-
September
-
M. Bhattacharyya, M. G. Schultz, E. Eskin, S. Hershkop, and S. J. Stolfo. MET: An Experimental System for Malicious Email Tracking. In Proceedings of the New Security Paradigms Workshop (NSPW), pages 1–12, September 2002.
-
(2002)
Proceedings of the New Security Paradigms Workshop (NSPW)
, pp. 1-12
-
-
Bhattacharyya, M.1
Schultz, M.G.2
Eskin, E.3
Hershkop, S.4
Stolfo, S.J.5
-
12
-
-
14944363571
-
Toward understanding distributed blackhole placement
-
October
-
E. Cook, M. Bailey, Z. M. Mao, and D. McPherson. Toward Understanding Distributed Blackhole Placement. In Proceedings of the ACM Workshop on Rapid Malcode (WORM), pages 54–64, October 2004.
-
(2004)
Proceedings of the ACM Workshop on Rapid Malcode (WORM)
, pp. 54-64
-
-
Cook, E.1
Bailey, M.2
Mao, Z.M.3
McPherson, D.4
-
13
-
-
35048879637
-
HoneyStat: Local worm detection using honepots
-
October
-
th International Symposium on Recent Advances in Intrusion Detection (RAID), pages 39–58, October 2004.
-
(2004)
th International Symposium on Recent Advances in Intrusion Detection (RAID)
, pp. 39-58
-
-
Dagon, D.1
Qin, X.2
Gu, G.3
Lee, W.4
Grizzard, J.5
Levine, J.6
Owen, H.7
-
14
-
-
0042078549
-
A survey of rollback-recovery protocols in message-passing systems
-
E. N. Elnozahy, L. Alvisi, Y.-M. Wang, and D. B. Johnson. A survey of rollback-recovery protocols in message-passing systems. ACM Comput. Surv., 34(3):375–408, 2002.
-
(2002)
ACM Comput. Surv.
, vol.34
, Issue.3
, pp. 375-408
-
-
Elnozahy, E.N.1
Alvisi, L.2
Wang, Y.-M.3
Johnson, D.B.4
-
18
-
-
84948431640
-
Stateful intrusion detection for high-speed networks
-
May
-
C. Kruegel, F. Valeur, G. Vigna, and R. Kemmerer. Stateful Intrusion Detection for High-Speed Networks. In Proceedings of the IEEE Symposium on Security and Privacy, pages 285–294, May 2002.
-
(2002)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 285-294
-
-
Kruegel, C.1
Valeur, F.2
Vigna, G.3
Kemmerer, R.4
-
20
-
-
10944236904
-
Using honeynets to protect large enterprise networks
-
November/December
-
J. G. Levine, J. B. Grizzard, and H. L. Owen. Using Honeynets to Protect Large Enterprise Networks. IEEE Security & Privacy, 2(6):73–75, November/December 2004.
-
(2004)
IEEE Security & Privacy
, vol.2
, Issue.6
, pp. 73-75
-
-
Levine, J.G.1
Grizzard, J.B.2
Owen, H.L.3
-
21
-
-
0034479192
-
Secure execution of java applets using a remote playground
-
D. Malkhi and M. K. Reiter. Secure execution of java applets using a remote playground. IEEE Trans. Softw. Eng., 26(12):1197–1209, 2000.
-
(2000)
IEEE Trans. Softw. Eng.
, vol.26
, Issue.12
, pp. 1197-1209
-
-
Malkhi, D.1
Reiter, M.K.2
-
22
-
-
0027631586
-
The denotational semantics of a functional tree-manipulation language
-
A. J. Malton. The Denotational Semantics of a Functional Tree-Manipulation Language. Computer Languages, 19(3):157–168, 1993.
-
(1993)
Computer Languages
, vol.19
, Issue.3
, pp. 157-168
-
-
Malton, A.J.1
-
25
-
-
4544239482
-
ButterCup: On network-based detection of polymorphic buffer overflow vulnerabilities
-
April
-
A. Pasupulati, J. Coit, K. Levitt, S. F. Wu, S. H. Li, J. C. Kuo, and K. P. Fan. Buttercup: On Network-based Detection of Polymorphic Buffer Overflow Vulnerabilities. In Proceedings of the Network Operations and Management Symposium (NOMS), pages 235–248, vol. 1, April 2004.
-
(2004)
Proceedings of the Network Operations and Management Symposium (NOMS)
, vol.1
, pp. 235-248
-
-
Pasupulati, A.1
Coit, J.2
Levitt, K.3
Wu, S.F.4
Li, S.H.5
Kuo, J.C.6
Fan, K.P.7
-
26
-
-
4344593013
-
Beyond stack smashing: Recent advances in exploiting buffer overflows
-
July/August
-
J. Pincus and B. Baker. Beyond Stack Smashing: Recent Advances in Exploiting Buffer Overflows. IEEE Security & Privacy, 2(4):20–27, July/August 2004.
-
(2004)
IEEE Security & Privacy
, vol.2
, Issue.4
, pp. 20-27
-
-
Pincus, J.1
Baker, B.2
-
27
-
-
14944359480
-
A hybrid quarantine defense
-
October
-
P. Porras, L. Briesemeister, K. Levitt, J. Rowe, and Y.-C. A. Ting. A Hybrid Quarantine Defense. In Proceedings of the ACM Workshop on Rapid Malcode (WORM), pages 73–82, October 2004.
-
(2004)
Proceedings of the ACM Workshop on Rapid Malcode (WORM)
, pp. 73-82
-
-
Porras, P.1
Briesemeister, L.2
Levitt, K.3
Rowe, J.4
Ting, Y.-C.A.5
-
31
-
-
0036931592
-
The design and implementation of an intrusion tolerant system
-
June
-
J. C. Reynolds, J. Just, E. Lawson, L. Clough, and R. Maglich. The Design and Implementation of an Intrusion Tolerant System. In Proceedings of the International Conference on Dependable Systems and Networks (DSN), June 2002.
-
(2002)
Proceedings of the International Conference on Dependable Systems and Networks (DSN)
-
-
Reynolds, J.C.1
Just, J.2
Lawson, E.3
Clough, L.4
Maglich, R.5
-
32
-
-
85090433665
-
SNORT: Lightweight intrusion detection for networks
-
November software
-
M. Roesch. Snort: Lightweight intrusion detection for networks. In Proceedings of USENIX LISA, November 1999. (software available from http://www.snort.org/).
-
(1999)
Proceedings of USENIX LISA
-
-
Roesch, M.1
-
38
-
-
0036038994
-
Building a robust software-based router using network processors
-
Chateau Lake Louise, Banff, Alberta, Canada, October
-
th ACM Symposium on Operating Systems Principles (SOSP), pages 216–229, Chateau Lake Louise, Banff, Alberta, Canada, October 2001.
-
(2001)
th ACM Symposium on Operating Systems Principles (SOSP)
, pp. 216-229
-
-
Spalink, T.1
Karlin, S.2
Peterson, L.3
Gottlieb, Y.4
-
39
-
-
0037269111
-
Reliable identification of bounded-length viruses is NP-complete
-
January
-
D. Spinellis. Reliable identification of bounded-length viruses is NP-complete. IEEE Transactions on Information Theory, 49(1):280–284, January 2003.
-
(2003)
IEEE Transactions on Information Theory
, vol.49
, Issue.1
, pp. 280-284
-
-
Spinellis, D.1
-
41
-
-
14844308379
-
Containment of scanning worms in enterprise networks
-
to appear
-
S. Staniford. Containment of Scanning Worms in Enterprise Networks. Journal of Computer Security, 2005. (to appear).
-
(2005)
Journal of Computer Security
-
-
Staniford, S.1
-
42
-
-
14944380936
-
The top speed of flash worms
-
October
-
S. Staniford, D. Moore, V. Paxson, and N. Weaver. The Top Speed of Flash Worms. In Proceedings of the ACM Workshop on Rapid Malcode (WORM), pages 33–42, October 2004.
-
(2004)
Proceedings of the ACM Workshop on Rapid Malcode (WORM)
, pp. 33-42
-
-
Staniford, S.1
Moore, D.2
Paxson, V.3
Weaver, N.4
-
44
-
-
33845428560
-
Secure program execution via dynamic information flow tracking
-
G. E. Suh, J. W. Lee, D. Zhang, and S. Devadas. Secure program execution via dynamic information flow tracking. SIGOPS Operating Systems Review, 38(5):85–96, 2004.
-
(2004)
SIGOPS Operating Systems Review
, vol.38
, Issue.5
, pp. 85-96
-
-
Suh, G.E.1
Lee, J.W.2
Zhang, D.3
Devadas, S.4
-
52
-
-
21844456680
-
Shield: Vulnerability-driven network filters for preventing known vulnerability exploits
-
August
-
H. J. Wang, C. Guo, D. R. Simon, and A. Zugenmaier. Shield: Vulnerability-Driven Network Filters for Preventing Known Vulnerability Exploits. In Proceedings of the ACM SIGCOMM Conference, pages 193–204, August 2004.
-
(2004)
Proceedings of the ACM SIGCOMM Conference
, pp. 193-204
-
-
Wang, H.J.1
Guo, C.2
Simon, D.R.3
Zugenmaier, A.4
-
56
-
-
84892612179
-
An effective architecture and algorithm for detecting worms with various scan techniques
-
February
-
J. Wu, S. Vangala, L. Gao, and K. Kwiat. An Effective Architecture and Algorithm for Detecting Worms with Various Scan Techniques. In Proceedings of the ISOC Symposium on Network and Distributed System Security (SNDSS), pages 143–156, February 2004.
-
(2004)
Proceedings of the ISOC Symposium on Network and Distributed System Security (SNDSS)
, pp. 143-156
-
-
Wu, J.1
Vangala, S.2
Gao, L.3
Kwiat, K.4
|