-
1
-
-
84868904728
-
-
Computer emergency response team cert
-
Computer emergency response team (cert). http://www.cert.org.
-
-
-
-
2
-
-
60649109574
-
-
Intel ia-32 architecture software developer's manual 1:, Intel Corporation
-
Intel ia-32 architecture software developer's manual volume 1: Basic architecture. Intel Corporation.
-
Basic architecture
-
-
-
4
-
-
84868904730
-
-
The metasploit project
-
The metasploit project. http://www.metasploit.com.
-
-
-
-
5
-
-
84868904726
-
-
Microsoft security bulletin
-
Microsoft security bulletin. http://www.microsoft.com/technet/security/ current.aspx.
-
-
-
-
6
-
-
60649086323
-
-
the de facto standard for intrusion deetection/preventions. http://www.snort.org.
-
the de facto standard for intrusion deetection/preventions. http://www.snort.org.
-
-
-
-
8
-
-
33746405183
-
A fast static analysis approach to detect exploit code inside network flows
-
R. Chinchani and E. Van Den Berg. A fast static analysis approach to detect exploit code inside network flows. In RAID, 2005.
-
(2005)
RAID
-
-
Chinchani, R.1
Van Den Berg, E.2
-
9
-
-
60649112208
-
-
C. Cifuentes and A. Fraboulet. Intraprocedural static slicing of binary executables
-
C. Cifuentes and A. Fraboulet. Intraprocedural static slicing of binary executables.
-
-
-
-
10
-
-
0004046658
-
A taxonomy of obfuscating transformations
-
Technical Report 148, University of Auckland, July
-
C. Collberg, C. Thomborson, and D. Low. A taxonomy of obfuscating transformations. Technical Report 148, University of Auckland, July 1997.
-
(1997)
-
-
Collberg, C.1
Thomborson, C.2
Low, D.3
-
13
-
-
77953319851
-
-
C. Ionescu. Getpc code. http://www.securityfocus.com/archive/82/327348/ 2006-01-03/1.
-
Getpc code
-
-
Ionescu, C.1
-
14
-
-
0016971687
-
Symbolic execution and program testing
-
J. C. King. Symbolic execution and program testing. Communications of the ACM, 19(7), 1976.
-
(1976)
Communications of the ACM
, vol.19
, Issue.7
-
-
King, J.C.1
-
15
-
-
33746389292
-
Polymorphic worm detection using structural information of executables
-
C. Kruegel, E. Kirda, D. Mutz, W. Robertson, and G. Vigna. Polymorphic worm detection using structural information of executables. In RAID, 2005.
-
(2005)
RAID
-
-
Kruegel, C.1
Kirda, E.2
Mutz, D.3
Robertson, W.4
Vigna, G.5
-
17
-
-
33751064824
-
Hamsa: Fast signature generation for zero-day polymorphic worms with provable attack resilience
-
May
-
Z. Li, M. Sanghi, Y. Chen, M. Y. Kao, and B. Chavez. Hamsa: Fast signature generation for zero-day polymorphic worms with provable attack resilience. In IEEE Symposium on Security and Privacy, May 2006.
-
(2006)
IEEE Symposium on Security and Privacy
-
-
Li, Z.1
Sanghi, M.2
Chen, Y.3
Kao, M.Y.4
Chavez, B.5
-
18
-
-
14344262813
-
Obfuscation of executable code to improve resistance to static disassembly
-
C. Linn and S. Debray. Obfuscation of executable code to improve resistance to static disassembly. In ACM CCS, 2003.
-
(2003)
ACM CCS
-
-
Linn, C.1
Debray, S.2
-
22
-
-
84868901454
-
-
Noir. Getpc code. http://www.securityfocus.com/archive/82/327100/2006-01- 03/1.
-
Getpc code
-
-
Noir1
-
24
-
-
14844309952
-
Earlybird system for real-time detection of unknown worms
-
Technical report, Univ. of California at San Diego
-
S. Singh, C. Estan, G. Varghese, and S. Savage. Earlybird system for real-time detection of unknown worms. Technical report, Univ. of California at San Diego, 2003.
-
(2003)
-
-
Singh, S.1
Estan, C.2
Varghese, G.3
Savage, S.4
-
25
-
-
33846887337
-
History and advances in windows shellcode
-
July
-
sk. History and advances in windows shellcode. Phrack, vol. 11, no. 62, July 2004.
-
(2004)
Phrack
, vol.11
, Issue.62
-
-
sk1
-
27
-
-
60649090576
-
Testing network-based intrusion detection signatures using mutant exploits
-
G. Vigna, W. Robertson, and D. Balzarotti. Testing network-based intrusion detection signatures using mutant exploits. In ACM CCS, 2005.
-
(2005)
ACM CCS
-
-
Vigna, G.1
Robertson, W.2
Balzarotti, D.3
-
29
-
-
34547261222
-
Packet vaccine: Black-box exploit detection and signature generation
-
X. F. Wang, Z. Li, J. Xu, M. K. Reiter, C. Kil, and J. Y. Choi. Packet vaccine: Black-box exploit detection and signature generation. In ACM Conference on CCS, 2006.
-
(2006)
ACM Conference on CCS
-
-
Wang, X.F.1
Li, Z.2
Xu, J.3
Reiter, M.K.4
Kil, C.5
Choi, J.Y.6
|