-
1
-
-
70349299454
-
-
International Telecommunication Union Recommendation T.81: JPEG Specification. http://www.w3.org/Graphics/JPEG/itu-t81.pdf.
-
International Telecommunication Union Recommendation T.81: JPEG Specification. http://www.w3.org/Graphics/JPEG/itu-t81.pdf.
-
-
-
-
2
-
-
70349277996
-
-
TIFF Revision 6.0. http://partners.adobe.com/public/developer/en/tiff/ TIFF6.pdf.
-
TIFF Revision 6.0. http://partners.adobe.com/public/developer/en/tiff/ TIFF6.pdf.
-
-
-
-
3
-
-
33846012075
-
-
A. Aho, M. Lam, R. Sethi, and J. Ullman. Compilers:, Addison-Wesley
-
A. Aho, M. Lam, R. Sethi, and J. Ullman. Compilers: Principles, Techniques, and Tools. Addison-Wesley, 2007.
-
(2007)
Principles, Techniques, and Tools
-
-
-
4
-
-
33745956039
-
Framework for instruction-level tracing and analysis of program executions
-
Ottawa, Canada, June
-
S. Bhansali, W.-K. Chen. S. de Jong, A. Edwords, R. Murray. M. Drinic, D. Mihocka, and J. Chau. Framework for instruction-level tracing and analysis of program executions. In Proceedings of the Second International Conference on Virtual Execution Environments, Ottawa, Canada, June 2006.
-
(2006)
Proceedings of the Second International Conference on Virtual Execution Environments
-
-
Bhansali, S.1
Chen, W.-K.2
de Jong, S.3
Edwords, A.4
Murray, R.5
Drinic, M.6
Mihocka, D.7
Chau, J.8
-
5
-
-
56549108391
-
A Generic Application-Level Protocol Analyzer and its Language
-
March
-
N. Borisov, D. J. Brumley, H. J. Wang, J. Dunagan, P. Joshi, and C. Guo. A Generic Application-Level Protocol Analyzer and its Language. In Proceedings of the 14th Annual Network & Distributed System Security Symposium (NDSS), March 2007.
-
(2007)
Proceedings of the 14th Annual Network & Distributed System Security Symposium (NDSS)
-
-
Borisov, N.1
Brumley, D.J.2
Wang, H.J.3
Dunagan, J.4
Joshi, P.5
Guo, C.6
-
6
-
-
77952403312
-
Polyglot: Automatic Extraction of Protocol Message Format using Dynamic Binary Analysis
-
Alexandria, VA, October
-
J. Caballero, H. Yin, Z. Liang, and D. Song. Polyglot: Automatic Extraction of Protocol Message Format using Dynamic Binary Analysis. In Proceedings of the 14th ACM Conference on Computer and Communications Security, Alexandria, VA, October 2007.
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security
-
-
Caballero, J.1
Yin, H.2
Liang, Z.3
Song, D.4
-
7
-
-
0347747977
-
Greedy local improvement and weighted setpacking
-
B. Chandra and M. Halldórsson. Greedy local improvement and weighted setpacking. Journal of Algorithms, 39(2):223-240, 2001.
-
(2001)
Journal of Algorithms
, vol.39
, Issue.2
, pp. 223-240
-
-
Chandra, B.1
Halldórsson, M.2
-
8
-
-
84866655092
-
6th ACM SIGPLAN-SIGSOFT Workshop on Program Analysis for Software Tools and Engineering (PASTE 2005)
-
88-95
-
M. Christodorescu, N. Kidd, and W.-H. Goh. String analysis for x86 binaries. 6th ACM SIGPLAN-SIGSOFT Workshop on Program Analysis for Software Tools and Engineering (PASTE 2005). 31(1):88-95, 2006.
-
(2006)
, vol.31
, Issue.1
-
-
Christodorescu, M.1
Kidd, N.2
Goh, W.-H.3
-
12
-
-
84893143817
-
Discoverer: Automatic Protocol Reverse Engineering from Network Traces
-
Boston, MA, August
-
W. Cui, J. Kannan, and H. J. Wang. Discoverer: Automatic Protocol Reverse Engineering from Network Traces. In Proceedings of the 16th USENIX Security Symposium, Boston, MA, August 2007.
-
(2007)
Proceedings of the 16th USENIX Security Symposium
-
-
Cui, W.1
Kannan, J.2
Wang, H.J.3
-
15
-
-
34548087556
-
-
M. D. Ernst, J. H. Perkins, P. J. Guo, S. McCamant, C. Pacheco, M. S. Tschantz, and C. Xiao. The Daikon System for Dynamic Detection of Likely Invariants. 2007.
-
(2007)
The Daikon System for Dynamic Detection of Likely Invariants
-
-
Ernst, M.D.1
Perkins, J.H.2
Guo, P.J.3
McCamant, S.4
Pacheco, C.5
Tschantz, M.S.6
Xiao, C.7
-
16
-
-
0003415244
-
-
RFC 2616
-
R. Fielding, J. Gettys, J. Mogul, H. Frystyk, L. Masinter, P. Leach, and T. Berners-Lee. RFC 2616: Hypertext Transfer Protocol-HTTP/1.1. http://www.w3.org/Protocols/rfc2616/rfc2616.html.
-
Hypertext Transfer Protocol-HTTP/1.1
-
-
Fielding, R.1
Gettys, J.2
Mogul, J.3
Frystyk, H.4
Masinter, L.5
Leach, P.6
Berners-Lee, T.7
-
20
-
-
70349267143
-
-
T. O. Group. Dcc 1.1: Remote procedure call. http://www.opengroup.org/ onlinepubs/9629399/toc.htm.
-
T. O. Group. Dcc 1.1: Remote procedure call. http://www.opengroup.org/ onlinepubs/9629399/toc.htm.
-
-
-
-
21
-
-
33646508996
-
On the complexity of approximating k-set packing
-
E. Hazan, S. Safra, and O. Schwartz. On the complexity of approximating k-set packing. Computational Complexity, 15(1):20-39, 2006.
-
(2006)
Computational Complexity
, vol.15
, Issue.1
, pp. 20-39
-
-
Hazan, E.1
Safra, S.2
Schwartz, O.3
-
22
-
-
34547427252
-
Semi-Automated Discovery of Application Session Structure
-
Rio de Janeiro, Brazil, October
-
J. Kannan, J. Jung, V. Paxson, and C. E. Koksal. Semi-Automated Discovery of Application Session Structure. In Proceedings qf the 2006 Internet Measurement Conference (IMC), Rio de Janeiro, Brazil, October 2006.
-
(2006)
Proceedings qf the 2006 Internet Measurement Conference (IMC)
-
-
Kannan, J.1
Jung, J.2
Paxson, V.3
Koksal, C.E.4
-
23
-
-
59249094556
-
Automatic Handling of Protocol Dependencies and Reaction to 0-Day Attacks with ScriptGen based Honeypots
-
Hamburg, Germany, September
-
C. Leita, M. Dacier, and F. Massicotte. Automatic Handling of Protocol Dependencies and Reaction to 0-Day Attacks with ScriptGen based Honeypots. In Proceedings of the 9th International Symposium on Recent Advances in Intrusion Detection, Hamburg, Germany, September 2006.
-
(2006)
Proceedings of the 9th International Symposium on Recent Advances in Intrusion Detection
-
-
Leita, C.1
Dacier, M.2
Massicotte, F.3
-
25
-
-
34948842431
-
Extracting file formats from executables
-
S. E. Sim and M. Di Penta, editors, Benevento, Italy, Oct. 23-27
-
J. Lim, T. Reps. and B. Liblit. Extracting file formats from executables. In S. E. Sim and M. Di Penta, editors, Proceedings of the 13th Working Conference on Reverse Engineering, Benevento, Italy, Oct. 23-27 2006.
-
(2006)
Proceedings of the 13th Working Conference on Reverse Engineering
-
-
Lim, J.1
Reps, T.2
Liblit, B.3
-
26
-
-
70350414407
-
Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution
-
Z. Lin, X. Jiang, D. Xu, and X. Zhang. Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution. In Proceedings of NDSS'2008, 2008.
-
(2008)
Proceedings of NDSS'2008
-
-
Lin, Z.1
Jiang, X.2
Xu, D.3
Zhang, X.4
-
32
-
-
34547396634
-
-
R. Pang, V. Paxson, R. Somer, and L. Peterson. binpac: A yacc for Writing Application Protocol Parsers. In Proceedings of the 2006 Internet Measurement Conference, October 2006.
-
R. Pang, V. Paxson, R. Somer, and L. Peterson. binpac: A yacc for Writing Application Protocol Parsers. In Proceedings of the 2006 Internet Measurement Conference, October 2006.
-
-
-
-
33
-
-
0033295259
-
Bro: A system for detecting network intruders in real time
-
V. Paxson. Bro: A system for detecting network intruders in real time. Computer Networks, 31 (23):2435-2463, 1999.
-
(1999)
Computer Networks
, vol.31
, Issue.23
, pp. 2435-2463
-
-
Paxson, V.1
-
35
-
-
70349293259
-
-
The Protocol Informatics Project
-
The Protocol Informatics Project. http://www.baselineresearch.net/PI/.
-
-
-
-
36
-
-
76649131417
-
-
How Samba Was Written. http://samba.org/ftp/tridge/misc/french-cafe.txt.
-
How Samba Was Written
-
-
-
37
-
-
70349290174
-
-
K. Sollins. Rfc 1350: The tftp protocol (revision 2). http://www.faqs.org/rfcs/rfc1350.html.
-
K. Sollins. Rfc 1350: The tftp protocol (revision 2). http://www.faqs.org/rfcs/rfc1350.html.
-
-
-
-
41
-
-
27544510809
-
Shield: Vulnerability-Driven Network Filters for Preventing Known Vulnerability Exploits
-
August
-
H. J. Wang, C. Guo, D. R. Simon, and A. Zugenmaier. Shield: Vulnerability-Driven Network Filters for Preventing Known Vulnerability Exploits. In Proceedings of the ACM SIGCOMM, August 2004.
-
(2004)
Proceedings of the ACM SIGCOMM
-
-
Wang, H.J.1
Guo, C.2
Simon, D.R.3
Zugenmaier, A.4
|