-
1
-
-
65349145047
-
Using Programmer-Written Compiler Extensions to Catch Security Holes
-
Oakland, CA
-
K. Ashcraft and D.R. Engler, "Using Programmer-Written Compiler Extensions to Catch Security Holes", IEEE Symposium on Security and Privacy, Oakland, CA, 2002.
-
(2002)
IEEE Symposium on Security and Privacy
-
-
Ashcraft, K.1
Engler, D.R.2
-
2
-
-
85084160243
-
Stack-Guard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks
-
San Antonio, TX
-
C. Cowan, C. Pu, D. Maier, H. Hinton, P. Bakke, S. Beattie, A. Grier, P. Wagle and Q. Zhang, "Stack-Guard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks", 7th USENIX Security Symposium, San Antonio, TX, 1998.
-
(1998)
7th USENIX Security Symposium
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Hinton, H.4
Bakke, P.5
Beattie, S.6
Grier, A.7
Wagle, P.8
Zhang, Q.9
-
3
-
-
0002582136
-
Buffer Overflows: Attacks and Defenses for the Vulnerability of the Decade
-
Hilton Head Island, SC
-
C. Cowan, P. Wagle, C. Pu, S. Beattie and J. Walpole, "Buffer Overflows: Attacks and Defenses for the Vulnerability of the Decade", DARPA Information Survivability Conference and Expo, Hilton Head Island, SC, 2000.
-
(2000)
DARPA Information Survivability Conference and Expo
-
-
Cowan, C.1
Wagle, P.2
Pu, C.3
Beattie, S.4
Walpole, J.5
-
5
-
-
0029716418
-
A Sense of Self for Unix Processes
-
Los Alamos, CA
-
S. Forrest, S.A. Hofmeyr, A. Somayaji and T.A. Longstaff, "A Sense of Self for Unix Processes", IEEE Symposium on Computer Security and Privacy, Los Alamos, CA, pp.120-128, 1996.
-
(1996)
IEEE Symposium on Computer Security and Privacy
, pp. 120-128
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
Longstaff, T.A.4
-
6
-
-
85084160308
-
A study in using neural networks for anomaly and misuse detection
-
A. Ghosh and A. Schwartzbard, "A study in using neural networks for anomaly and misuse detection", 8th USENIX Security Symposium, pp. 141-151, 1999.
-
(1999)
8th USENIX Security Symposium
, pp. 141-151
-
-
Ghosh, A.1
Schwartzbard, A.2
-
8
-
-
0032313923
-
Intrusion Detection System Using Sequences of System Calls
-
S.A. Hofmeyr, A. Somayaji, and S. Forrest, "Intrusion Detection System Using Sequences of System Calls", Journal of Computer Security, 6(3), pp. 151-180, 1998.
-
(1998)
Journal of Computer Security
, vol.6
, Issue.3
, pp. 151-180
-
-
Hofmeyr, S.A.1
Somayaji, A.2
Forrest, S.3
-
10
-
-
0028714365
-
Automated Detection of Vulnerabilities in Privileged Programs by Execution Monitoring
-
Orlando, Fl
-
C. Ko, G. Fink and K. Levitt, "Automated Detection of Vulnerabilities in Privileged Programs by Execution Monitoring", 10th Computer Security Applications Conference, Orlando, Fl, pp.134-144, 1994.
-
(1994)
10th Computer Security Applications Conference
, pp. 134-144
-
-
Ko, C.1
Fink, G.2
Levitt, K.3
-
11
-
-
85084163349
-
Data Mining Approaches for Intrusion Detection
-
San Antonio, TX
-
W. Lee and S. Stolfo, "Data Mining Approaches for Intrusion Detection", 7th USENIX Security Symposium, San Antonio, TX, 1998.
-
(1998)
7th USENIX Security Symposium
-
-
Lee, W.1
Stolfo, S.2
-
14
-
-
0031684427
-
Combinatorial Pattern Discovery in Biological Sequences: The TEIRESIAS Algorithm
-
I. Rigoutsos and A. Floratos, "Combinatorial Pattern Discovery in Biological Sequences: The TEIRESIAS Algorithm", Bioinformatics, 14(1), pp. 55-67, 1998.
-
(1998)
Bioinformatics
, vol.14
, Issue.1
, pp. 55-67
-
-
Rigoutsos, I.1
Floratos, A.2
-
15
-
-
77952265719
-
The Process of Security
-
April
-
B. Schneier, "The Process of Security", Information Security, April, 2000, http://www.infosecuritymag.com/articles/april00/columns cryptorhythms.shtml.
-
(2000)
Information Security
-
-
Schneier, B.1
-
16
-
-
0034829697
-
A Fast Automaton-Based Method for Detecting Anomalous Program Behaviors
-
Oakland, CA
-
R. Sekar, M. Bendre, P. Bollineni, and D. Dhurjati, "A Fast Automaton-Based Method for Detecting Anomalous Program Behaviors", IEEE Symposium on Security and Privacy, Oakland, CA, 2001.
-
(2001)
IEEE Symposium on Security and Privacy
-
-
Sekar, R.1
Bendre, M.2
Bollineni, P.3
Dhurjati, D.4
-
19
-
-
84880174811
-
Detecting Intrusions Using System Calls: Alternative Data Models
-
C. Warrender, S. Forrest, and B. Pearlmutter, "Detecting Intrusions Using System Calls: Alternative Data Models", IEEE Symposium on Security and Privacy, pp. 133-145, 1999.
-
(1999)
IEEE Symposium on Security and Privacy
, pp. 133-145
-
-
Warrender, C.1
Forrest, S.2
Pearlmutter, B.3
-
20
-
-
84944248021
-
Intrusion Detection Using Variable-Length Audit Trail Patterns
-
3rd International Workshop on the Recent Advances in Intrusion Detection , Springer
-
A. Wespi, M. Dacier and H. Debar, "Intrusion Detection Using Variable-Length Audit Trail Patterns", 3rd International Workshop on the Recent Advances in Intrusion Detection , LNCS 1907, Springer, pp. 110-129, 2000.
-
(2000)
LNCS
, vol.1907
, pp. 110-129
-
-
Wespi, A.1
Dacier, M.2
Debar, H.3
|