-
1
-
-
70349298079
-
-
flex: The Fast Lexical Analyzer. http://flex.sourceforge.net/, as of 2008.
-
flex: The Fast Lexical Analyzer. http://flex.sourceforge.net/, as of 2008.
-
-
-
-
2
-
-
70349296542
-
-
bftpd. http://freshmeat.net/projects/bftpd/, as of April, 2008.
-
bftpd. http://freshmeat.net/projects/bftpd/, as of April, 2008.
-
-
-
-
3
-
-
70349288863
-
-
Microsoft baseline security analyzer, http://www.microsoft.com/technet/ security/tools/MBSAHome.mspx,as of April, 2008.
-
Microsoft baseline security analyzer, http://www.microsoft.com/technet/ security/tools/MBSAHome.mspx,as of April, 2008.
-
-
-
-
5
-
-
33751056900
-
-
D. Brumley, J. Newsome, D. X. Song, H. Wang, and S. Jha. Towards automatic generation of vulnerability-based signatures. In S&P, pages 2-16, 2006.
-
D. Brumley, J. Newsome, D. X. Song, H. Wang, and S. Jha. Towards automatic generation of vulnerability-based signatures. In S&P, pages 2-16, 2006.
-
-
-
-
6
-
-
0029311990
-
Cfengine: A site configuration engine
-
Summer
-
M. Burgess. Cfengine: A site configuration engine. USENIX Computing systems, 8(3):309-337, Summer 1995.
-
(1995)
USENIX Computing systems
, vol.8
, Issue.3
, pp. 309-337
-
-
Burgess, M.1
-
7
-
-
77952403312
-
Polyglot: Automatic extraction of protocol message format using dynamic binary analysis
-
J. Caballero, H. Yin, Z. Liang, and D. Song. Polyglot: automatic extraction of protocol message format using dynamic binary analysis. In CCS '07: Proceedings of the 14th ACM conference on Computer and communications security, pages 317-329, 2007.
-
(2007)
CCS '07: Proceedings of the 14th ACM conference on Computer and communications security
, pp. 317-329
-
-
Caballero, J.1
Yin, H.2
Liang, Z.3
Song, D.4
-
8
-
-
34547335786
-
Tainttrace: Efficient flow tracing with dynamic binary rewriting
-
W. Cheng, Q. Zhao, B. Yu, and S. Hiroshige. Tainttrace: Efficient flow tracing with dynamic binary rewriting. In ISCC, pages 749-754, 2006.
-
(2006)
ISCC
, pp. 749-754
-
-
Cheng, W.1
Zhao, Q.2
Yu, B.3
Hiroshige, S.4
-
10
-
-
33745788387
-
On deriving unknown vulnerabilities from zero-day polymorphic and metamorphie worm exploits
-
New York, NY, USA, ACM Press
-
J. R. Crandall, Z. Su, and S. F. Wu. On deriving unknown vulnerabilities from zero-day polymorphic and metamorphie worm exploits. In CCS '05: Proceedings of the 12th ACM conference on Computer and communications security, pages 235-248, New York, NY, USA, 2005. ACM Press.
-
(2005)
CCS '05: Proceedings of the 12th ACM conference on Computer and communications security
, pp. 235-248
-
-
Crandall, J.R.1
Su, Z.2
Wu, S.F.3
-
12
-
-
70349294946
-
Bison: The Yacc-Compatible Parser Generator
-
Bloomington, Indiana
-
C. Donnelly and R. Stallman. Bison: The Yacc-Compatible Parser Generator. Luniverse Inc, Bloomington, Indiana, 2000.
-
(2000)
Luniverse Inc
-
-
Donnelly, C.1
Stallman, R.2
-
13
-
-
84903607772
-
Dynamic spyware analysis
-
June
-
M. Egele, C. Kruegel, E. Kirda, H. Yin, and D. Song. Dynamic spyware analysis. In Proceedings of the 2007 USENIX Annual Technical Conference (Usenix'07), June 2007.
-
(2007)
Proceedings of the 2007 USENIX Annual Technical Conference (Usenix'07)
-
-
Egele, M.1
Kruegel, C.2
Kirda, E.3
Yin, H.4
Song, D.5
-
14
-
-
0016971687
-
Symbolic execution and program testing
-
J. C. King. Symbolic execution and program testing. Commun. ACM, 19(7):385-394, 1976.
-
(1976)
Commun. ACM
, vol.19
, Issue.7
, pp. 385-394
-
-
King, J.C.1
-
16
-
-
84976651458
-
A fast algorithm for finding dominators in aflowgraph
-
T. Lengauer and R. E. Tarjan. A fast algorithm for finding dominators in aflowgraph. ACM Trans. Program. Lang. Syst., 1(1): 121-141, 1979.
-
(1979)
ACM Trans. Program. Lang. Syst
, vol.1
, Issue.1
, pp. 121-141
-
-
Lengauer, T.1
Tarjan, R.E.2
-
17
-
-
74049090626
-
Automatic protocol format reverse engineering through context-aware monitored execution
-
Z. Lin, X. Jiang, D. Xu, and X. Zhang. Automatic protocol format reverse engineering through context-aware monitored execution. In NDSS, 2008.
-
(2008)
NDSS
-
-
Lin, Z.1
Jiang, X.2
Xu, D.3
Zhang, X.4
-
18
-
-
31944440969
-
Pin: Building customized program analysis tools with dynamic instrumentation
-
C.-K. Luk, R. Cohn, R. Muth, H. Patil, A. Klauser, G. Lowney, S. Wallace, V. J. Reddi, and K. Hazelwood. Pin: building customized program analysis tools with dynamic instrumentation. In PLDI '05: Proceedings of the 2005 ACM SIGPLAN conference on Programming language design and implementation, pages 190-200, 2005.
-
(2005)
PLDI '05: Proceedings of the 2005 ACM SIGPLAN conference on Programming language design and implementation
, pp. 190-200
-
-
Luk, C.-K.1
Cohn, R.2
Muth, R.3
Patil, H.4
Klauser, A.5
Lowney, G.6
Wallace, S.7
Reddi, V.J.8
Hazelwood, K.9
-
20
-
-
85047208169
-
Understanding and dealing with operator mistakes in internet services
-
K. Nagaraja, F. Oliveira, R. Bianchini, R. P. Martin, and T. D. Nguyen. Understanding and dealing with operator mistakes in internet services. In OSDI'04: Proceedings of the 6th conference on Symposium on Opearting Systems Design & Implementation, pages 5-5, 2004.
-
(2004)
OSDI'04: Proceedings of the 6th conference on Symposium on Opearting Systems Design & Implementation
, pp. 5-5
-
-
Nagaraja, K.1
Oliveira, F.2
Bianchini, R.3
Martin, R.P.4
Nguyen, T.D.5
-
21
-
-
34547349153
-
Replayer: Automatic protocol replay by binary analysis
-
J. Newsome, D. Brumley, J. Franklin, and D. X. Song. Replayer: automatic protocol replay by binary analysis. In ACM Conference on Computer and Communications Security, pages 311-321, 2006.
-
(2006)
ACM Conference on Computer and Communications Security
, pp. 311-321
-
-
Newsome, J.1
Brumley, D.2
Franklin, J.3
Song, D.X.4
-
22
-
-
79953672829
-
Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
-
J. Newsome and D. X. Song. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In NDSS, 2005.
-
(2005)
NDSS
-
-
Newsome, J.1
Song, D.X.2
-
24
-
-
40349087553
-
A low-overhead practical information flow tracking system for detecting security attacks
-
F. Qin, C. Wang, Z. Li, H.-S. Kim, Y. Zhou, and Y Wu. Lift: A low-overhead practical information flow tracking system for detecting security attacks. In MICRO, pages 135-148, 2006.
-
(2006)
MICRO
, pp. 135-148
-
-
Qin, F.1
Wang, C.2
Li, Z.3
Kim, H.-S.4
Zhou, Y.5
Lift, Y.W.6
-
26
-
-
21644475650
-
RIFLE: An architectural framework for user-centric information-flow security
-
IEEE Computer Society
-
N. Vachharajani, M. J. Bridges, J. Chang. R. Rangan, G. Ottoni, J. A. Blome, G. A. Reis, M. Vachharajani, and D. I. August. RIFLE: An architectural framework for user-centric information-flow security. In MICRO, pages 243-254. IEEE Computer Society, 2004.
-
(2004)
MICRO
, pp. 243-254
-
-
Vachharajani, N.1
Bridges, M.J.2
Chang, J.3
Rangan, R.4
Ottoni, G.5
Blome, J.A.6
Reis, G.A.7
Vachharajani, M.8
August, D.I.9
-
27
-
-
85077048913
-
Automatic misconfiguration troubleshooting with peerpressure
-
H. J. Wang, J. C. Platt, Y. Chen, R. Zhang, and Y.-M. Wang. Automatic misconfiguration troubleshooting with peerpressure. In OSDI, pages 245-258, 2004.
-
(2004)
OSDI
, pp. 245-258
-
-
Wang, H.J.1
Platt, J.C.2
Chen, Y.3
Zhang, R.4
Wang, Y.-M.5
-
28
-
-
70349299600
-
Towards automatics reverse engineering of software security configurations
-
Technical Report IUCS-TR667, Indiana University
-
R. Wang, X. Wang, K. Zhang, and Z. Li. Towards automatics reverse engineering of software security configurations. Technical Report IUCS-TR667, Indiana University, 2008.
-
(2008)
-
-
Wang, R.1
Wang, X.2
Zhang, K.3
Li, Z.4
-
29
-
-
77952114571
-
Strider: A black-box, state-based approach to change and configuration management and support
-
Y.-M. Wang, C. Verbowski, J. Dunagan, Y. Chen, H. J. Wang, C. Yuan, and Z. Zhang. Strider: A black-box, state-based approach to change and configuration management and support. In LISA, pages 159-172, 2003.
-
(2003)
LISA
, pp. 159-172
-
-
Wang, Y.-M.1
Verbowski, C.2
Dunagan, J.3
Chen, Y.4
Wang, H.J.5
Yuan, C.6
Zhang, Z.7
-
32
-
-
77950788046
-
Panorama: Capturing system-wide information flow for malware detection and analysis
-
October
-
H. Yin, D. Song, E. Manuel, C. Kruegel, and E. Kirda. Panorama: Capturing system-wide information flow for malware detection and analysis. In Proceedings of the 14th ACM Conferences on Computer and Communication Security (CCS'07), October 2007.
-
(2007)
Proceedings of the 14th ACM Conferences on Computer and Communication Security (CCS'07)
-
-
Yin, H.1
Song, D.2
Manuel, E.3
Kruegel, C.4
Kirda, E.5
-
33
-
-
34548030922
-
Automatic configuration of internet services
-
New York, NY, USA, ACM
-
W. Zheng, R. Bianchini, and T. D. Nguyen. Automatic configuration of internet services. In EuroSys '07: Proceedings of the 2nd ACM SIGOPS/EuroSys European Conference on Computer Systems 2007, pages 219-229," New York, NY, USA, 2007. ACM.
-
(2007)
EuroSys '07: Proceedings of the 2nd ACM SIGOPS/EuroSys European Conference on Computer Systems
, pp. 219-229
-
-
Zheng, W.1
Bianchini, R.2
Nguyen, T.D.3
|