-
1
-
-
0033295259
-
-
Paxson, V.: Bro: A System for Detecting Network Intruders in Real-Time. Computer Networks 31(23-24), 2345-2463 (1999)
-
Paxson, V.: Bro: A System for Detecting Network Intruders in Real-Time. Computer Networks 31(23-24), 2345-2463 (1999)
-
-
-
-
2
-
-
21844456680
-
Shield: Vulnerability-Driven Network Filters for Preventing Known Vulnerability Exploits
-
Wang, H.J., Guo, C., Simon, D.R., Zugenmaier, A.: Shield: Vulnerability-Driven Network Filters for Preventing Known Vulnerability Exploits. In: Proceedings of ACM SIGCOMM 2004, pp. 193-204 (2004)
-
(2004)
Proceedings of ACM SIGCOMM 2004
, pp. 193-204
-
-
Wang, H.J.1
Guo, C.2
Simon, D.R.3
Zugenmaier, A.4
-
3
-
-
34548717095
-
Shieldgen: Automatic Data Patch Generation for Unknown Vulnerabilities with Informed Probing
-
Oakland, CA May
-
Cui, W., Peinado, M., Wang, H.J., Locasto, M.: Shieldgen: Automatic Data Patch Generation for Unknown Vulnerabilities with Informed Probing. In: Proceedings of 2007 IEEE Symposium on Security and Privacy, Oakland, CA (May 2007)
-
(2007)
Proceedings of 2007 IEEE Symposium on Security and Privacy
-
-
Cui, W.1
Peinado, M.2
Wang, H.J.3
Locasto, M.4
-
4
-
-
84869643168
-
-
The Protocol Informatics Project
-
The Protocol Informatics Project, http://www.baselineresearch.net/PI/
-
-
-
-
6
-
-
84893143817
-
Discoverer: Automatic Protocol Reverse Engineering from Network Traces
-
Boston, MA August
-
Cui, W., Kannan, J., Wang, H.J.: Discoverer: Automatic Protocol Reverse Engineering from Network Traces. In: Proceedings of the 16th USENIX Security Symposium (Security 2007), Boston, MA (August 2007)
-
(2007)
Proceedings of the 16th USENIX Security Symposium (Security
-
-
Cui, W.1
Kannan, J.2
Wang, H.J.3
-
7
-
-
70349283250
-
Tupni: Automatic Reverse Engineering of Input Formats
-
October
-
Cui, W., Peinado, M., Chen, K., Wang, H.J., Irun-Briz, L.: Tupni: Automatic Reverse Engineering of Input Formats. In: Proceedings of the 15th ACM Conferences on Computer and Communication Security, CCS 2008 (October 2008)
-
(2008)
Proceedings of the 15th ACM Conferences on Computer and Communication Security, CCS
-
-
Cui, W.1
Peinado, M.2
Chen, K.3
Wang, H.J.4
Irun-Briz, L.5
-
8
-
-
74049090626
-
Automatic Protocol Format Reverse Engineering Through Context-Aware Monitored Execution
-
February
-
Lin, Z., Jiang, X., Xu, D., Zhang, X.: Automatic Protocol Format Reverse Engineering Through Context-Aware Monitored Execution. In: Proceedings of the 15th Annual Network and Distributed System Security Symposium (NDSS 2008) (February 2008)
-
(2008)
Proceedings of the 15th Annual Network and Distributed System Security Symposium (NDSS
-
-
Lin, Z.1
Jiang, X.2
Xu, D.3
Zhang, X.4
-
9
-
-
85180792232
-
Automatic Network Protocol Analysis
-
February
-
Wondracek, G., Comparetti, P.M., Kruegel, C., Kirda, E.: Automatic Network Protocol Analysis. In: Proceedings of the 15th Annual Network and Distributed System Security Symposium (NDSS 2008) (February 2008)
-
(2008)
Proceedings of the 15th Annual Network and Distributed System Security Symposium (NDSS
-
-
Wondracek, G.1
Comparetti, P.M.2
Kruegel, C.3
Kirda, E.4
-
10
-
-
70350402293
-
Prospex: Protocol Specification Extraction
-
Oakland, CA May
-
Comparetti, P.M., Wondracek, G., Kruegel, C., Kirda, E.: Prospex: Protocol Specification Extraction. In: Proceedings of 2009 IEEE Symposium on Security and Privacy, Oakland, CA (May 2009)
-
(2009)
Proceedings of 2009 IEEE Symposium on Security and Privacy
-
-
Comparetti, P.M.1
Wondracek, G.2
Kruegel, C.3
Kirda, E.4
-
11
-
-
85084160792
-
Understanding Data Lifetime via Whole-System Simulation
-
San Diego, CA
-
Chow, J., Pfaff, B., Christopher, K., Rosenblum, M.: Understanding Data Lifetime via Whole-System Simulation. In: Proceedings of the 13th USENIX Security Symposium, San Diego, CA (2004)
-
(2004)
Proceedings of the 13th USENIX Security Symposium
-
-
Chow, J.1
Pfaff, B.2
Christopher, K.3
Rosenblum, M.4
-
12
-
-
79953672829
-
Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software
-
San Diego, CA February
-
Newsome, J., Song, D.: Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software. In: Proceedings of the 14th Annual Network and Distributed System Security Symposium (NDSS 2005), San Diego, CA (February 2005)
-
(2005)
Proceedings of the 14th Annual Network and Distributed System Security Symposium (NDSS
-
-
Newsome, J.1
Song, D.2
-
15
-
-
70350424365
-
-
Wang, Z., Jiang, X., Cui, W., Wang, X.: Reformat: Automatic Reverse Engineering of Encrypted Messages (Department of Computer Science Technical Report, North Carolina State University, TR-2008-26) (2008)
-
Wang, Z., Jiang, X., Cui, W., Wang, X.: Reformat: Automatic Reverse Engineering of Encrypted Messages (Department of Computer Science Technical Report, North Carolina State University, TR-2008-26) (2008)
-
-
-
-
16
-
-
84869644748
-
-
Ircd-hybrid, High Performance Internet Relay Chat
-
Ircd-hybrid - High Performance Internet Relay Chat, http://ircd-hybrid. com/
-
-
-
-
17
-
-
78249251033
-
Protocol-Independent Adaptive Replay of Application Dialog
-
San Diego, CA February
-
Cui, W., Paxson, V., Weaver, N., Katz, R.H.: Protocol-Independent Adaptive Replay of Application Dialog. In: Proceedings of the 13th Annual Network and Distributed System Security Symposium (NDSS 2006), San Diego, CA (February 2006)
-
(2006)
Proceedings of the 13th Annual Network and Distributed System Security Symposium (NDSS
-
-
Cui, W.1
Paxson, V.2
Weaver, N.3
Katz, R.H.4
-
18
-
-
33846316416
-
-
Leita, C., Mermoud, K., Dacier, M.: ScriptGen: An Automated Script Generation Tool for Honeyd. In: Srikanthan, T., Xue, J., Chang, C.-H. (eds.) ACSAC 2005. LNCS, 3740, pp. 203-214. Springer, Heidelberg (2005)
-
Leita, C., Mermoud, K., Dacier, M.: ScriptGen: An Automated Script Generation Tool for Honeyd. In: Srikanthan, T., Xue, J., Chang, C.-H. (eds.) ACSAC 2005. LNCS, vol. 3740, pp. 203-214. Springer, Heidelberg (2005)
-
-
-
-
19
-
-
84889030419
-
Shredding Your Garbage: Reducing Data Lifetime through Secure Deallocation
-
Baltimore, Maryland
-
Chow, J., Pfaff, B., Garfinkel, T., Rosenblum, M.: Shredding Your Garbage: Reducing Data Lifetime through Secure Deallocation. In: Proceedings of the 14th USENIX Security Symposium, Baltimore, Maryland (2005)
-
(2005)
Proceedings of the 14th USENIX Security Symposium
-
-
Chow, J.1
Pfaff, B.2
Garfinkel, T.3
Rosenblum, M.4
|