-
1
-
-
33745788387
-
On Deriving Unknown Vulnerabilities from Zero-Day Polymorphic and Metamorphic Worm Exploits
-
J. Crandall et al., "On Deriving Unknown Vulnerabilities from Zero-Day Polymorphic and Metamorphic Worm Exploits," i Proc. ACM Computer and Comm. Security (CCS) i, pp. 235-248, 2005.
-
(2005)
i Proc. ACM Computer and Comm. Security (CCS)
, vol.1
, pp. 235-248
-
-
Crandall, J.1
-
2
-
-
33746389292
-
Polymorphic Worm Detection Using Structural Information of Executables
-
C. Kruegel et al., "Polymorphic Worm Detection Using Structural Information of Executables," i Proc. Recent Advances in Intrusion Detection (RAID) i, pp. 207-226, 2005.
-
(2005)
i Proc. Recent Advances in Intrusion Detection (RAID)
, vol.1
, pp. 207-226
-
-
Kruegel, C.1
-
3
-
-
33751064824
-
-
Z. Li et al., Hamsa: Fast Signature Generation for Zero-Day Polymorphic Worms with Provable Attack Resilience, i Proc. IEEE Symp. Security and Privacy (S&P) i, pp. 32-47, 2006.
-
Z. Li et al., "Hamsa: Fast Signature Generation for Zero-Day Polymorphic Worms with Provable Attack Resilience," i Proc. IEEE Symp. Security and Privacy (S&P) i, pp. 32-47, 2006.
-
-
-
-
4
-
-
27544498978
-
-
J. Newsome, B. Karp, and D. Song, Polygraph: Automatically Generating Signatures for Polymorphic Worms, i Proc. IEEE Symp. Security and Privacy (S&P) i, pp. 226-241, 2005.
-
J. Newsome, B. Karp, and D. Song, "Polygraph: Automatically Generating Signatures for Polymorphic Worms," i Proc. IEEE Symp. Security and Privacy (S&P) i, pp. 226-241, 2005.
-
-
-
-
5
-
-
25844462447
-
Defending Against Internet Worms: A Signature-Based Approach, i
-
Y. Tang and S. Chen, "Defending Against Internet Worms: A Signature-Based Approach," i Proc. IEEE INFOCOM i, pp. 1384-1393, 2005.
-
(2005)
Proc. IEEE INFOCOM
, vol.1
, pp. 1384-1393
-
-
Tang, Y.1
Chen, S.2
-
6
-
-
34248403361
-
Polymorphic Worm Detection and Defense: System Design, Experimental Methodology, and Data Resources
-
J. Wang, I. Hamadeh, G. Kesidis, and D. Miller, "Polymorphic Worm Detection and Defense: System Design, Experimental Methodology, and Data Resources," i Proc. ACM Large Scale Attack Defense Workshop i, pp. 169-176, 2006.
-
(2006)
i Proc. ACM Large Scale Attack Defense Workshop
, vol.1
, pp. 169-176
-
-
Wang, J.1
Hamadeh, I.2
Kesidis, G.3
Miller, D.4
-
7
-
-
4544239482
-
Buttercup: On Network-Based Detection of Polymorphic Buffer Overflow Vulnerabilities
-
A. Pasupulati et al., "Buttercup: On Network-Based Detection of Polymorphic Buffer Overflow Vulnerabilities," i Proc. IEEE/IFIP Network Operations and Management Systems (NOMS) i, pp. 235-248, 2004.
-
(2004)
i Proc. IEEE/IFIP Network Operations and Management Systems (NOMS)
, vol.1
, pp. 235-248
-
-
Pasupulati, A.1
-
8
-
-
33846855150
-
-
M. Polychronakis, K. Anagnostakis, and E. Markatos, Network-Level Polymorphic Shellcode Detection Using Emulation, i J. Computer Virology i, 2, no. 4, pp. 257-274, Feb. 2007.
-
M. Polychronakis, K. Anagnostakis, and E. Markatos, "Network-Level Polymorphic Shellcode Detection Using Emulation," i J. Computer Virology i, vol. 2, no. 4, pp. 257-274, Feb. 2007.
-
-
-
-
10
-
-
33751051489
-
-
R. Perdisci et al., Misleading Worm Signature Generators Using Deliberate Noise Injection, i Proc. IEEE Symp. Security and Privacy (S&P) i, pp. 17-31, 2006.
-
R. Perdisci et al., "Misleading Worm Signature Generators Using Deliberate Noise Injection," i Proc. IEEE Symp. Security and Privacy (S&P) i, pp. 17-31, 2006.
-
-
-
-
11
-
-
33750332606
-
Paragraph: Thwarting Signature Learning by Training Maliciously
-
J. Newsome, B. Karp, and D. Song, "Paragraph: Thwarting Signature Learning by Training Maliciously," i Proc. Recent Advances in Intrusion Detection (RAID) i, pp. 81-105, 2006.
-
(2006)
i Proc. Recent Advances in Intrusion Detection (RAID)
, vol.1
, pp. 81-105
-
-
Newsome, J.1
Karp, B.2
Song, D.3
-
12
-
-
0042474227
-
Modeling the Spread of Active Worms, i
-
Z. Chen, L. Gao, and K. Kwait, "Modeling the Spread of Active Worms," i Proc. IEEE INFOCOM i, pp. 1890-1900, 2003.
-
(2003)
Proc. IEEE INFOCOM
, vol.1
, pp. 1890-1900
-
-
Chen, Z.1
Gao, L.2
Kwait, K.3
-
13
-
-
34248995311
-
Modeling and Simulation Study of the Propagation and Defense of Internet Email Worm
-
4, Apr
-
C. Zou, D. Towsley, and W. Gong, "Modeling and Simulation Study of the Propagation and Defense of Internet Email Worm," i IEEE Trans. Dependable and Secure Computing i, vol. 4, no. 2, pp. 105-118, Apr. 2007.
-
(2007)
i IEEE Trans. Dependable and Secure Computing
, vol.1
, Issue.2
, pp. 105-118
-
-
Zou, C.1
Towsley, D.2
Gong, W.3
-
14
-
-
0141762461
-
Code Red: A Case Study on the Spread and Victims of an Internet Worm
-
D. Moore, C. Shannon, and K. Claffy, "Code Red: A Case Study on the Spread and Victims of an Internet Worm," Proc. Internet Measurement Workshop (IMW), pp. 273-284, 2002.
-
(2002)
Proc. Internet Measurement Workshop (IMW)
, pp. 273-284
-
-
Moore, D.1
Shannon, C.2
Claffy, K.3
-
15
-
-
0042474173
-
Internet Quarantine: Requirements for Containing Self-Propagating Code
-
D. Moore et al., "Internet Quarantine: Requirements for Containing Self-Propagating Code," Proc. IEEE INFOCOM, pp. 1901-1910, 2003.
-
(2003)
Proc. IEEE INFOCOM
, pp. 1901-1910
-
-
Moore, D.1
-
16
-
-
14844322335
-
Testing Network-Based Intrusion Detection Signatures Using Mutant Exploits
-
G. Vigna et al., "Testing Network-Based Intrusion Detection Signatures Using Mutant Exploits," Proc. ACM Computer and Comm. Security (CCS) pp. 21-30, 2004.
-
(2004)
Proc. ACM Computer and Comm. Security (CCS)
, pp. 21-30
-
-
Vigna, G.1
-
17
-
-
34548043748
-
Sweeper: A Lightweight End-to-End System for Defending Against Fast Worms
-
J. Tucek et al., "Sweeper: A Lightweight End-to-End System for Defending Against Fast Worms," Proc. European Professional Soc. for Systems (EuroSys) Conf., pp. 115-128, 2007.
-
(2007)
Proc. European Professional Soc. for Systems (EuroSys) Conf
, pp. 115-128
-
-
Tucek, J.1
-
18
-
-
37849024155
-
On the Adaptive Real-Time Detection of Fast-Propagating Network Worms
-
J. Jung, R. Milito, and V. Paxson, "On the Adaptive Real-Time Detection of Fast-Propagating Network Worms," Proc. Detection of Intrusions and Malware and Vulnerabillity Assessment (DIMVA), pp. 175-192, 2007.
-
(2007)
Proc. Detection of Intrusions and Malware and Vulnerabillity Assessment (DIMVA)
, pp. 175-192
-
-
Jung, J.1
Milito, R.2
Paxson, V.3
-
19
-
-
85084164480
-
Very Fast Containment of Scanning Worms
-
N. Weaver, S. Staniford, and V. Paxson, "Very Fast Containment of Scanning Worms," Proc. Advanced Computing Systems Assoc. (USENIX) Security Symp., pp. 29-44, 2004.
-
(2004)
Proc. Advanced Computing Systems Assoc. (USENIX) Security Symp
, pp. 29-44
-
-
Weaver, N.1
Staniford, S.2
Paxson, V.3
-
21
-
-
77950788046
-
Panorama: Capturing System-Wide Information Flow for Malware Detection and Analysis
-
H. Yin et al., "Panorama: Capturing System-Wide Information Flow for Malware Detection and Analysis," Proc. ACM Computer and Comm. Security (CCS), pp. 116-127, 2007.
-
(2007)
Proc. ACM Computer and Comm. Security (CCS)
, pp. 116-127
-
-
Yin, H.1
-
22
-
-
33745641552
-
Anomalous Payload-Based Worm Detection and Signature Generation
-
K. Wang, G. Cretu, and S. Stolfo, "Anomalous Payload-Based Worm Detection and Signature Generation," Proc. Recent Advances in Intrusion Detection (RAID), pp. 227-246, 2006.
-
(2006)
Proc. Recent Advances in Intrusion Detection (RAID)
, pp. 227-246
-
-
Wang, K.1
Cretu, G.2
Stolfo, S.3
-
23
-
-
0034598259
-
Error Thresholds for Quasispecies on Dynamic Fitness Landscapes
-
Jan
-
M. Nilsson and N. Snoad, "Error Thresholds for Quasispecies on Dynamic Fitness Landscapes," Physical Rev. Letters, vol. 84, no. 1, pp. 191-194, Jan. 2000.
-
(2000)
Physical Rev. Letters
, vol.84
, Issue.1
, pp. 191-194
-
-
Nilsson, M.1
Snoad, N.2
-
24
-
-
4043163016
-
Coevolution of Quasispecies: B-Cell Mutation Rates Maximize Viral Error Catastrophes
-
Feb
-
C. Kamp and S. Bornholdt, "Coevolution of Quasispecies: B-Cell Mutation Rates Maximize Viral Error Catastrophes," Physical Rev. Letters, vol. 88, no. 6, pp. 068104.1-068104.4, Feb. 2002.
-
(2002)
Physical Rev. Letters
, vol.88
, Issue.6
-
-
Kamp, C.1
Bornholdt, S.2
-
25
-
-
0030736223
-
Computer Virus-Antivirus Coevolution
-
Jan
-
C. Nachenberg, "Computer Virus-Antivirus Coevolution," Comm. ACM vol. 40, no. 1, pp. 46-51, Jan. 1997.
-
(1997)
Comm. ACM
, vol.40
, Issue.1
, pp. 46-51
-
-
Nachenberg, C.1
-
26
-
-
33751056900
-
Towards Automatic Generation of Vulnerability-Based Signatures
-
D. Brumley et al., "Towards Automatic Generation of Vulnerability-Based Signatures," Proc. IEEE Symp. Security and Privacy (S&P), pp. 2-16, 2006.
-
(2006)
Proc. IEEE Symp. Security and Privacy (S&P)
, pp. 2-16
-
-
Brumley, D.1
-
29
-
-
34548318486
-
A Quasi-Species Approach for Modeling the Dynamics of Polymorphic Worms
-
B. Stephenson and B. Sikdar, "A Quasi-Species Approach for Modeling the Dynamics of Polymorphic Worms," Proc. IEEE INFOCOM, pp. 1-12, 2006.
-
(2006)
Proc. IEEE INFOCOM
, pp. 1-12
-
-
Stephenson, B.1
Sikdar, B.2
-
30
-
-
85084162258
-
How to Own the Internet in Your Spare Time
-
S. Staniford, V. Paxson, and N. Weaver, "How to Own the Internet in Your Spare Time," Proc. Advanced Computing Systems Assoc. (USENIX) Security Symp., pp. 149-167, 2002.
-
(2002)
Proc. Advanced Computing Systems Assoc. (USENIX) Security Symp
, pp. 149-167
-
-
Staniford, S.1
Paxson, V.2
Weaver, N.3
-
31
-
-
68949166716
-
-
K2, ADMmutate, http://www.ktwo.ca/c/ADMmutate-0.8.4.tar.gz, 2009.
-
(2009)
K2, ADMmutate
-
-
|