-
4
-
-
84903607772
-
Dynamic spyware analysis
-
Berkeley, CA, USA
-
M. Egele, C. Kruegel, E. Kirda, H. Yin, and D. Song. Dynamic spyware analysis. In USENIX Annual Technical Conference, Berkeley, CA, USA, 2007.
-
(2007)
USENIX Annual Technical Conference
-
-
Egele, M.1
Kruegel, C.2
Kirda, E.3
Yin, H.4
Song, D.5
-
6
-
-
84875947153
-
Detours: Binary interception of win32 functions
-
Berkeley, CA, USA
-
G. Hunt and D. Brubacher. Detours: binary interception of win32 functions. In USENIX Windows NT Symposium, Berkeley, CA, USA, 1999.
-
(1999)
USENIX Windows NT Symposium
-
-
Hunt, G.1
Brubacher, D.2
-
7
-
-
84922146311
-
-
available at, http://www.virtualbox.org
-
InnoTek. VirtualBox Documentation available at http://www.virtualbox. org/. http://www.virtualbox.org.
-
VirtualBox Documentation
-
-
InnoTek1
-
8
-
-
0033751850
-
A semantic approach to secure information flow
-
R. Joshi and K. R. M. Leino. A semantic approach to secure information flow. Science of Computer Programming, 37(1-3):113-138, 2000.
-
(2000)
Science of Computer Programming
, vol.37
, Issue.1-3
, pp. 113-138
-
-
Joshi, R.1
Leino, K.R.M.2
-
9
-
-
39049154912
-
Data sandboxing: A technique for enforcing confidentiality policies
-
Miami Beach, Dec
-
T. Khatiwala, R. Swaminathan, and V. N. Venkatakrishnan. Data sandboxing: A technique for enforcing confidentiality policies. In ACSAC, Miami Beach, Dec. 2006.
-
(2006)
ACSAC
-
-
Khatiwala, T.1
Swaminathan, R.2
Venkatakrishnan, V.N.3
-
11
-
-
60649106490
-
-
MSDN, available at, http://msdn.microsoft.com
-
MSDN. Hooks Documentation available at http://msdn2.microsoft.com/en- us/library/ms632589.aspx. http://msdn.microsoft.com.
-
Hooks Documentation
-
-
-
13
-
-
79953672829
-
Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
-
J. Newsome and D. Song. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In Network and Distributed Systems Security, 2005.
-
(2005)
Network and Distributed Systems Security
-
-
Newsome, J.1
Song, D.2
-
15
-
-
0007968045
-
Virtual network computing
-
T. Richardson, Q. Stafford-Fraser, K. R. Wood, and A. Hopper. Virtual network computing. IEEE Internet Computing, 2(1):33-38, 1998.
-
(1998)
IEEE Internet Computing
, vol.2
, Issue.1
, pp. 33-38
-
-
Richardson, T.1
Stafford-Fraser, Q.2
Wood, K.R.3
Hopper, A.4
-
19
-
-
60649101528
-
-
TightVNC. Available at
-
TightVNC. Available at http://www.tightvnc.org.
-
-
-
-
21
-
-
60649085524
-
Provably correct runtime enforcement of non-interference properties
-
Raleigh, NC, November
-
V.N. Venkatakrishnan, W. Xu, D. C. DuVarney, and R. Sekar. Provably correct runtime enforcement of non-interference properties. In ICICS Raleigh, NC, November 2006.
-
(2006)
ICICS
-
-
Venkatakrishnan, V.N.1
Xu, W.2
DuVarney, D.C.3
Sekar, R.4
-
25
-
-
85038810709
-
Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks
-
W. Xu, S. Bhatkar, and R. Sekar. Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks. In USENIX Security Symposium, 2006.
-
(2006)
USENIX Security Symposium
-
-
Xu, W.1
Bhatkar, S.2
Sekar, R.3
-
26
-
-
77950788046
-
Panorama: Capturing system-wide information flow for malware detection and analysis
-
Alexandra, Oct
-
H. Yin, D. Song, M. Egele, C. Kruegel, and E. Kirda. Panorama: capturing system-wide information flow for malware detection and analysis. In ACM Conference on Computer and Comm. Security, Alexandra, Oct 2007.
-
(2007)
ACM Conference on Computer and Comm. Security
-
-
Yin, H.1
Song, D.2
Egele, M.3
Kruegel, C.4
Kirda, E.5
-
27
-
-
84991934426
-
Tightlip: Keeping applications from spilling the beans
-
USENIX
-
A. R. Yumerefendi, B. Mickle, and L. P. Cox. Tightlip: Keeping applications from spilling the beans. In NSDI. USENIX, 2007.
-
(2007)
NSDI
-
-
Yumerefendi, A.R.1
Mickle, B.2
Cox, L.P.3
|