-
1
-
-
64349107386
-
-
Linux Adore Worms, http://securityresponse.symantec.com/avcenter/ venc/data/linux.adore.worm.htm, 2007.
-
(2007)
Linux Adore Worms
-
-
-
2
-
-
64349111428
-
-
Linux Ramen Worm, http://service1.symantec.com/sarc/sarc.nsf/html/ pf/linux.ramen.worm.html, 2007.
-
(2007)
Linux Ramen Worm
-
-
-
3
-
-
64349094543
-
-
SANS Institute
-
SANS Institute: Lion Worm, http://www.sans.com/y2k/lion.htm, 2007.
-
(2007)
Lion Worm
-
-
-
4
-
-
64349114980
-
-
Sebek, http://www.honeynet.org/tools/sebek/, 2007.
-
(2007)
Sebek
-
-
-
5
-
-
64349119248
-
-
The Honeynet Project
-
The Honeynet Project, http://www.honeynet.org, 2007.
-
(2007)
-
-
-
7
-
-
64349118389
-
-
39020375,39191840,00.htm
-
Virus Writers Get Stealthy, http://news.zdnet.co.uk/internet/ security/0,39020375,39191840,00.htm, 2007.
-
(2007)
Virus Writers Get Stealthy
-
-
-
8
-
-
64349123782
-
-
June 2003
-
SARS Worms, http://www.xfocus.net/tools/200306/413.html, June 2003.
-
-
-
Worms, S.A.R.S.1
-
9
-
-
0036709428
-
Recovery from Malicious Transactions
-
Sept
-
P. Ammann, S. Jajodia, and P. Liu, "Recovery from Malicious Transactions," IEEE Trans. Knowledge and Data Eng., vol. 14, no. 5, pp. 1167-1185, Sept. 2002.
-
(2002)
IEEE Trans. Knowledge and Data Eng
, vol.14
, Issue.5
, pp. 1167-1185
-
-
Ammann, P.1
Jajodia, S.2
Liu, P.3
-
10
-
-
0030353831
-
MITRE Technical Report 2547 (Secure Computer System): Volume II
-
D. Bell and L. LaPadula, "MITRE Technical Report 2547 (Secure Computer System): Volume II," J. Computer Security, vol. 4, nos. 2/3, pp. 239-263, 1996.
-
(1996)
J. Computer Security
, vol.4
, Issue.2-3
, pp. 239-263
-
-
Bell, D.1
LaPadula, L.2
-
11
-
-
33947702316
-
Pervasive Binding of Labels to System Processes,
-
PhD dissertation, Purdue Univ, also as CERIAS Technical Report, 54
-
F. Buchholz, "Pervasive Binding of Labels to System Processes," PhD dissertation, Purdue Univ., also as CERIAS Technical Report 2005-54, 2005.
-
(2005)
-
-
Buchholz, F.1
-
12
-
-
10644245884
-
On the Role of File System Metadata in Digital Forensics
-
Dec
-
F. Buchholz and E.H. Spafford, "On the Role of File System Metadata in Digital Forensics," J. Digital Investigation, Dec. 2004.
-
(2004)
J. Digital Investigation
-
-
Buchholz, F.1
Spafford, E.H.2
-
14
-
-
85084160792
-
Understanding Data Lifetime via Whole System Simulation
-
Aug
-
J. Chow, B. Pfaff, T. Garfinkel, K. Christopher, and M. Rosenblum, "Understanding Data Lifetime via Whole System Simulation," Proc. 13th Usenix Security Symp., Aug. 2004.
-
(2004)
Proc. 13th Usenix Security Symp
-
-
Chow, J.1
Pfaff, B.2
Garfinkel, T.3
Christopher, K.4
Rosenblum, M.5
-
15
-
-
84889030419
-
Shredding Your Garbage: Reducing Data Lifetime through Secure Deallocation
-
Aug
-
J. Chow, B. Pfaff, T. Garfinkel, and M. Rosenblum, "Shredding Your Garbage: Reducing Data Lifetime through Secure Deallocation," Proc. 14th Usenix Security Symp., Aug. 2005.
-
(2005)
Proc. 14th Usenix Security Symp
-
-
Chow, J.1
Pfaff, B.2
Garfinkel, T.3
Rosenblum, M.4
-
16
-
-
0023266943
-
A Comparison of Commercial and Military Computer Security Policies
-
87, pp
-
D.R. Clark and D.R. Wilson, "A Comparison of Commercial and Military Computer Security Policies," Proc. IEEE Symp. Security and Privacy (S&P '87), pp. 184-194, 1987.
-
(1987)
Proc. IEEE Symp. Security and Privacy (S&P
, pp. 184-194
-
-
Clark, D.R.1
Wilson, D.R.2
-
17
-
-
0016949746
-
A Lattice Model of Secure Information Flow
-
May
-
D.E. Denning, "A Lattice Model of Secure Information Flow," Comm. ACM, vol. 19, pp. 236-243, May 1976.
-
(1976)
Comm. ACM
, vol.19
, pp. 236-243
-
-
Denning, D.E.1
-
20
-
-
21644433634
-
Xen and the Art of Virtualization
-
Oct
-
B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, I. Pratt, A. Warfield, P. Barham, and R. Neugebauer, "Xen and the Art of Virtualization," Proc. 19th ACM Symp. Operating Systems Principles (SOSP '03), Oct. 2003.
-
(2003)
Proc. 19th ACM Symp. Operating Systems Principles (SOSP '03)
-
-
Dragovic, B.1
Fraser, K.2
Hand, S.3
Harris, T.4
Ho, A.5
Pratt, I.6
Warfield, A.7
Barham, P.8
Neugebauer, R.9
-
21
-
-
84978401615
-
ReVirt: Enabling Intrusion Analysis through Virtual-Machine Logging and Replay
-
Dec
-
G.W. Dunlap, S.T. King, S. Cinar, M.A. Basrai, and P.M. Chen, "ReVirt: Enabling Intrusion Analysis through Virtual-Machine Logging and Replay," Proc. Fifth Symp. Operating Systems Design and Implementation (OSDI '02), Dec. 2002.
-
(2002)
Proc. Fifth Symp. Operating Systems Design and Implementation (OSDI '02)
-
-
Dunlap, G.W.1
King, S.T.2
Cinar, S.3
Basrai, M.A.4
Chen, P.M.5
-
22
-
-
20344391930
-
Intel Virtualization Technology
-
May
-
R. Uhlig et al., "Intel Virtualization Technology," Computer, special issue on virtualization technology, May 2005.
-
(2005)
Computer
, Issue.SPEC. ISSUE ON VIRTUALIZATION TECHNOLOGY
-
-
Uhlig, R.1
-
24
-
-
84960382252
-
Forensix: A Robust, High-Performance Reconstruction System
-
June
-
A. Goel, W.-C. Feng, D. Maier, W.-C. Feng, and J. Walpole, "Forensix: A Robust, High-Performance Reconstruction System," Proc. Second Int'l Workshop Security in Distributed Computing Systems (SDCS '05), June 2005.
-
(2005)
Proc. Second Int'l Workshop Security in Distributed Computing Systems (SDCS '05)
-
-
Goel, A.1
Feng, W.-C.2
Maier, D.3
Feng, W.-C.4
Walpole, J.5
-
25
-
-
84885588230
-
The Taser Intrusion Recovery System
-
Oct
-
A. Goel, K. Po, K. Farhadi, Z. Li, and E. de Lara, "The Taser Intrusion Recovery System," Proc. 20th ACM Symp. Operating Systems Principles (SOSP '05), Oct. 2005.
-
(2005)
Proc. 20th ACM Symp. Operating Systems Principles (SOSP '05)
-
-
Goel, A.1
Po, K.2
Farhadi, K.3
Li, Z.4
de Lara, E.5
-
28
-
-
48649093517
-
Practical, Dynamic Information Flow for Virtual Machines
-
V. Halder, D. Chandra, and M. Franz, "Practical, Dynamic Information Flow for Virtual Machines," Proc. Second Int'l Workshop Programming Language Interference and Dependence (PLID '05), 2005.
-
(2005)
Proc. Second Int'l Workshop Programming Language Interference and Dependence (PLID '05)
-
-
Halder, V.1
Chandra, D.2
Franz, M.3
-
29
-
-
34547307344
-
Virtual Playgrounds for Worm Behavior Investigation
-
Sept
-
X. Jiang, D. Xu, H.J. Wang, and E.H. Spafford, "Virtual Playgrounds for Worm Behavior Investigation," Proc. Eighth Int'l Symp. Recent Advances in Intrusion Detection (RAID '05), Sept. 2005.
-
(2005)
Proc. Eighth Int'l Symp. Recent Advances in Intrusion Detection (RAID '05)
-
-
Jiang, X.1
Xu, D.2
Wang, H.J.3
Spafford, E.H.4
-
30
-
-
85084164812
-
Collapsar: A VM-Based Architecture for Network Attack Detention Center
-
Aug
-
X. Jiang and D. Xu, "Collapsar: A VM-Based Architecture for Network Attack Detention Center," Proc. 13th Usenix Security Symp., Aug. 2004.
-
(2004)
Proc. 13th Usenix Security Symp
-
-
Jiang, X.1
Xu, D.2
-
33
-
-
85180415006
-
Enriching Intrusion Alerts through Multi-Host Causality
-
Feb
-
S.T. King, Z.M. Mao, D.G. Lucchetti, and P.M. Chen, "Enriching Intrusion Alerts through Multi-Host Causality," Proc. Network and Distributed System Security Symp. (NDSS '05), Feb. 2005.
-
(2005)
Proc. Network and Distributed System Security Symp. (NDSS '05)
-
-
King, S.T.1
Mao, Z.M.2
Lucchetti, D.G.3
Chen, P.M.4
-
38
-
-
79953672829
-
Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software
-
Feb
-
J. Newsome and D. Song, "Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software," Proc. Network and Distributed System Security Symp. (NDSS '05), Feb. 2005.
-
(2005)
Proc. Network and Distributed System Security Symp. (NDSS '05)
-
-
Newsome, J.1
Song, D.2
-
40
-
-
85084162914
-
Copilot - A Coprocessor-Based Kernel Runtime Integrity Monitor
-
Aug
-
N.L. Petroni, T. Fraser, J. Molina, and W.A. Arbaugh, "Copilot - A Coprocessor-Based Kernel Runtime Integrity Monitor," Proc. 13th Usenix Security Symp., Aug. 2004.
-
(2004)
Proc. 13th Usenix Security Symp
-
-
Petroni, N.L.1
Fraser, T.2
Molina, J.3
Arbaugh, W.A.4
-
41
-
-
84878346861
-
Improving Host Security with System Call Policies
-
Aug
-
N. Provos, "Improving Host Security with System Call Policies," Proc. 12th Usenix Security Symp., Aug. 2003.
-
(2003)
Proc. 12th Usenix Security Symp
-
-
Provos, N.1
-
42
-
-
33748537883
-
Pioneer: Verifying Integrity and Guaranteeing Execution of Code on Legacy Platforms
-
Oct
-
A. Seshadri, M. Luk, E. Shi, A. Perrig, L. van Doorn, and P. Khosla, "Pioneer: Verifying Integrity and Guaranteeing Execution of Code on Legacy Platforms," Proc. 20th ACM Symp. Operating Systems Principles (SOSP '05), Oct. 2005.
-
(2005)
Proc. 20th ACM Symp. Operating Systems Principles (SOSP '05)
-
-
Seshadri, A.1
Luk, M.2
Shi, E.3
Perrig, A.4
van Doorn, L.5
Khosla, P.6
-
43
-
-
84896257180
-
MOVE: An End-to-End Solution to Network Denial of Service
-
Feb
-
A. Stavrou, A.D. Keromytis, J. Nieh, V. Misra, and D. Rubenstein, "MOVE: An End-to-End Solution to Network Denial of Service," Proc. Symp. Network and Distributed System Security (NDSS '05), Feb. 2005.
-
(2005)
Proc. Symp. Network and Distributed System Security (NDSS '05)
-
-
Stavrou, A.1
Keromytis, A.D.2
Nieh, J.3
Misra, V.4
Rubenstein, D.5
-
44
-
-
84960561455
-
On Computable Numbers, with an Application to the Entscheidungs Problem
-
A.M. Turing, "On Computable Numbers, with an Application to the Entscheidungs Problem," Proc. London Math. Soc. Series 2, vol. 42, pp. 230-265, 1937.
-
(1937)
Proc. London Math. Soc. Series 2
, vol.42
, pp. 230-265
-
-
Turing, A.M.1
-
47
-
-
85038810709
-
Taint-Enhanced Policy Enforcement: A Practical Approach to Defeat a Wide Range of Attacks
-
W. Xu, S. Bhatkar, and R. Sekar, "Taint-Enhanced Policy Enforcement: A Practical Approach to Defeat a Wide Range of Attacks," Proc. 15th Usenix Security Symp., 2006.
-
(2006)
Proc. 15th Usenix Security Symp
-
-
Xu, W.1
Bhatkar, S.2
Sekar, R.3
-
49
-
-
33947629208
-
Provenance-Aware Tracing of Worm Break-in and Contaminations: A Process Coloring Approach
-
July
-
X. Jiang, A. Walters, F. Buchholz, D. Xu, Y.M. Wang, and E.H. Spafford, "Provenance-Aware Tracing of Worm Break-in and Contaminations: A Process Coloring Approach," Proc. 26th IEEE Int'l Conf. Distributed Computing Systems (ICDCS '06), July 2006.
-
(2006)
Proc. 26th IEEE Int'l Conf. Distributed Computing Systems (ICDCS '06)
-
-
Jiang, X.1
Walters, A.2
Buchholz, F.3
Xu, D.4
Wang, Y.M.5
Spafford, E.H.6
|