-
1
-
-
17444400103
-
Violating assumptions with fuzzing
-
P. Oehlert, "Violating Assumptions with Fuzzing," IEEE Security and Privacy, vol.3, no.2, 2005.
-
(2005)
IEEE Security and Privacy
, vol.3
, Issue.2
-
-
Oehlert, P.1
-
3
-
-
85084164413
-
Bro: A system for detecting network intruders in real-time
-
V. Paxson, "Bro: A System for Detecting Network Intruders in Real-Time," in Usenix Security Symposium, 1998.
-
(1998)
Usenix Security Symposium
-
-
Paxson, V.1
-
4
-
-
34547396634
-
Binpac: A yacc for writing application protocol parsers
-
R. Pang, V. Paxson, R. Sommer, and L. Peterson, "binpac: A yacc for writing application protocol parsers," in Internet Measurement Conference (IMC), 2006.
-
(2006)
Internet Measurement Conference (IMC)
-
-
Pang, R.1
Paxson, V.2
Sommer, R.3
Peterson, L.4
-
5
-
-
56549108391
-
A generic application-level protocol analyzer and its language
-
N. Borisov, D. Brumley, H. J. Wang, J. Dunagan, P. Joshi, and C. Guo, "A Generic Application-Level Protocol Analyzer and its Language," in 14th Symposium on Network and Distributed System Security (NDSS), 2007.
-
(2007)
14th Symposium on Network and Distributed System Security (NDSS)
-
-
Borisov, N.1
Brumley, D.2
Wang, H.J.3
Dunagan, J.4
Joshi, P.5
Guo, C.6
-
6
-
-
85038902950
-
Fig: Automatic fingerprint generation
-
S. Venkataraman, J. Caballero, P. Poosankam, M. Kang, and D. Song, "Fig: Automatic Fingerprint Generation," in Symposium on Network and Distributed System Security (NDSS), 2007.
-
(2007)
Symposium on Network and Distributed System Security (NDSS)
-
-
Venkataraman, S.1
Caballero, J.2
Poosankam, P.3
Kang, M.4
Song, D.5
-
7
-
-
85077688456
-
Towards automatic discovery of deviations in binary implementations with applications to error detection and fingerprint generation
-
D. Brumley, J. Caballero, Z. Liang, J. Newsome, and D. Song, "Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint Generation," in Usenix Security Symposium, 2007.
-
(2007)
Usenix Security Symposium
-
-
Brumley, D.1
Caballero, J.2
Liang, Z.3
Newsome, J.4
Song, D.5
-
8
-
-
48649089769
-
A taxonomy of botnet structures
-
D. Dagon, G. Gu, C. Lee, and W. Lee, "A Taxonomy of Botnet Structures," in Annual Computer Security Applications Conference (ACSAC), 2007.
-
(2007)
Annual Computer Security Applications Conference (ACSAC)
-
-
Dagon, D.1
Gu, G.2
Lee, C.3
Lee, W.4
-
9
-
-
44649128920
-
A multi-perspective analysis of the storm (Peacomm) worm
-
SRI International
-
P. Porras, H. Saidi, and V. Yegneswaran, "A Multi-perspective Analysis of the Storm (Peacomm) Worm," Computer Science Laboratory, SRI International, Tech. Rep., 2007.
-
(2007)
Computer Science Laboratory, Tech. Rep.
-
-
Porras, P.1
Saidi, H.2
Yegneswaran, V.3
-
11
-
-
84893143817
-
Discoverer: Automatic protocol reverse engineering from network traces
-
W. Cui, J. Kannan, and H. Wang, "Discoverer: Automatic Protocol Reverse Engineering from Network Traces," in 16th Usenix Security Symposium, 2007.
-
(2007)
16th Usenix Security Symposium
-
-
Cui, W.1
Kannan, J.2
Wang, H.3
-
12
-
-
70449680661
-
Protocol-independent adaptive replay of application dialog
-
W. Cui, V. Paxson, N. Weaver, and R. Katz, "Protocol- Independent Adaptive Replay of Application Dialog," in 13th Symposium on Network and Distributed System Security (NDSS), 2006.
-
(2006)
13th Symposium on Network and Distributed System Security (NDSS)
-
-
Cui, W.1
Paxson, V.2
Weaver, N.3
Katz, R.4
-
15
-
-
77952403312
-
Polyglot: Automatic extraction of protocol format using dynamic binary analysis
-
J. Caballero, H. Yin, Z. Liang, and D. Song, "Polyglot: Automatic Extraction of Protocol Format using Dynamic Binary Analysis," in 14th ACM Conference on Computer and Communications Security (CCS), 2007.
-
(2007)
14th ACM Conference on Computer and Communications Security (CCS)
-
-
Caballero, J.1
Yin, H.2
Liang, Z.3
Song, D.4
-
16
-
-
70350414407
-
Automatic protocol format reverse engineering through context-aware monitored execution
-
Z. Lin, X. Jiang, D. Xu, and X. Zhang, "Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution," in 15th Symposium on Network and Distributed System Security (NDSS), 2008.
-
(2008)
15th Symposium on Network and Distributed System Security (NDSS)
-
-
Lin, Z.1
Jiang, X.2
Xu, D.3
Zhang, X.4
-
17
-
-
56549114981
-
Automatic network protocol analysis
-
G. Wondracek, P. Milani Comparetti, C. Kruegel, and E. Kirda, "Automatic Network Protocol Analysis," in 15th Symposium on Network and Distributed System Security (NDSS), 2008.
-
(2008)
15th Symposium on Network and Distributed System Security (NDSS)
-
-
Wondracek, G.1
Comparetti, P.M.2
Kruegel, C.3
Kirda, E.4
-
18
-
-
70349283250
-
Tupni: Automatic reverse engineering of input formats
-
W. Cui, M. Peinado, K. Chen, H. Wang, and L. Irun-Briz, "Tupni : Automatic Reverse Engineering of Input Formats," in ACM Conference on Computer and Communications Security (CCS), 2008.
-
(2008)
ACM Conference on Computer and Communications Security (CCS)
-
-
Cui, W.1
Peinado, M.2
Chen, K.3
Wang, H.4
Irun-Briz, L.5
-
21
-
-
0142068387
-
Faster algorithms for finding minimal consistent DFAs
-
K. J. Lang, "Faster Algorithms for Finding Minimal Consistent DFAs," NEC Research Institute, Tech. Rep., 1999.
-
(1999)
NEC Research Institute, Tech. Rep.
-
-
Lang, K.J.1
-
22
-
-
85084160792
-
Understanding data lifetime via whole system simulation
-
J. Chow, B. Pfaff, T. Garfinkel, K. Christopher, and M. Rosenblum, "Understanding Data Lifetime via Whole System Simulation," in Usenix Security Symposium, 2004.
-
(2004)
Usenix Security Symposium
-
-
Chow, J.1
Pfaff, B.2
Garfinkel, T.3
Christopher, K.4
Rosenblum, M.5
-
23
-
-
84885679117
-
Vigilante: End-to-end containment of internet worms
-
M. Costa, J. Crowcroft, M. Castro, A. Rowstron, L. Zhou, L. Zhang, and P. Barham, "Vigilante: End-to-End Containment of Internet Worms," in 20th ACM Symposium on Operating Systems Principles (SOSP), 2005.
-
(2005)
20th ACM Symposium on Operating Systems Principles (SOSP)
-
-
Costa, M.1
Crowcroft, J.2
Castro, M.3
Rowstron, A.4
Zhou, L.5
Zhang, L.6
Barham, P.7
-
25
-
-
81855221759
-
ReFormat: Automatic reverse engineering of encrypted messages
-
Z. Wang, X. Jiang, W. Cui, and X. Wang, "ReFormat: Automatic Reverse Engineering of Encrypted Messages," NC State University, Tech. Rep. 2008-26, 2008.
-
(2008)
NC State University, Tech. Rep. 2008-26
-
-
Wang, Z.1
Jiang, X.2
Cui, W.3
Wang, X.4
-
26
-
-
0014757386
-
A general method applicable to the search for similarities in the amino acid sequence of two proteins
-
S. Needleman and C.Wunsch, "A General Method Applicable to the Search for Similarities in the Amino Acid Sequence of Two Proteins," Journal of Molecular Biology, vol.48, no.3, 1970.
-
(1970)
Journal of Molecular Biology
, vol.48
, Issue.3
-
-
Needleman, S.1
Wunsch, C.2
-
27
-
-
84980090975
-
The distribution of Flora in the alpine zone
-
P. Jaccard, "The Distribution of Flora in the Alpine Zone," The New Phytologist, vol.11, no.2, pp. 37-50, 1912.
-
(1912)
The New Phytologist
, vol.11
, Issue.2
, pp. 37-50
-
-
Jaccard, P.1
-
28
-
-
84941155240
-
Well separated clusters and optimal fuzzy partitions
-
J. Dunn, "Well Separated Clusters and Optimal Fuzzy Partitions," Journal of Cybernetics, vol.4, 1974.
-
(1974)
Journal of Cybernetics
, vol.4
-
-
Dunn, J.1
-
29
-
-
0031166291
-
Cluster validation using graph theoretic concepts
-
N. R. Pal and J. Biswas, "Cluster Validation Using Graph Theoretic Concepts," Pattern Recognition, vol.30, no.6, 1997.
-
(1997)
Pattern Recognition
, vol.30
, Issue.6
-
-
Pal, N.R.1
Biswas, J.2
-
30
-
-
49949150022
-
Language identification in the limit
-
E. M. Gold, "Language Identification in the Limit," Information and Control, vol.10, no.5, 1967.
-
(1967)
Information and Control
, vol.10
, Issue.5
-
-
Gold, E.M.1
-
31
-
-
19944414336
-
Inference of regular languages using state merging algorithms with search
-
M. Bugalho and A. L. Oliveira, "Inference of Regular Languages Using State Merging Algorithms with Search," Pattern Recognition, vol.38, no.9, 2005.
-
(2005)
Pattern Recognition
, vol.38
, Issue.9
-
-
Bugalho, M.1
Oliveira, A.L.2
-
32
-
-
0001187706
-
Complexity of automaton identification from given data
-
E. M. Gold, "Complexity of Automaton Identification from Given Data," Information and Control, vol.37, no.3, 1978.
-
(1978)
Information and Control
, vol.37
, Issue.3
-
-
Gold, E.M.1
-
33
-
-
0025557712
-
An empirical study of the reliability of UNIX utilities
-
B. Miller, L. Fredriksen, and B. So, "An Empirical Study of the Reliability of UNIX Utilities," Communications of the ACM, vol.33, no.12, 1990.
-
(1990)
Communications of the ACM
, vol.33
, Issue.12
-
-
Miller, B.1
Fredriksen, L.2
So, B.3
-
35
-
-
33750230605
-
Snooze: Toward a stateful network protocol fuzzer
-
G. Banks, M. Cova, V. Felmetsger, K. Almeroth, R. Kemmerer, and G. Vigna, "Snooze: Toward a Stateful Network Protocol Fuzzer," in Proceedings of the 9th Information Security Conference (ISC), 2006.
-
(2006)
Proceedings of the 9th Information Security Conference (ISC)
-
-
Banks, G.1
Cova, M.2
Felmetsger, V.3
Almeroth, K.4
Kemmerer, R.5
Vigna, G.6
-
36
-
-
20844452458
-
A short visit to the bot zoo [Malicious Bots Software]
-
T. Holz, "A Short Visit to the Bot Zoo [Malicious Bots Software]," Security & Privacy, IEEE, vol.3, no.3, 2005.
-
(2005)
Security & Privacy, IEEE
, vol.3
, Issue.3
-
-
Holz, T.1
-
39
-
-
84869665647
-
-
"X-Lite softphone," http://www.counterpath.com, 2008.
-
(2008)
X-lite Softphone
-
-
-
42
-
-
84869672530
-
-
Wietse Venema, "Postfix," http://www.postfix.org, 2008.
-
(2008)
Postfix
-
-
Venema, W.1
-
43
-
-
0142131676
-
A general objective for inductive inference
-
Department of Computer Science
-
C. Wallace and M. Georgeff, "A General Objective for Inductive Inference," Department of Computer Science, Monash University, Tech. Rep., 1983.
-
(1983)
Monash University, Tech. Rep.
-
-
Wallace, C.1
Georgeff, M.2
-
45
-
-
55949129223
-
Mining specifications
-
G. Ammons, R. Bodík, and J. R. Larus, "Mining Specifications," SIGPLAN Not., vol.37, no.1, 2002.
-
(2002)
SIGPLAN Not.
, vol.37
, Issue.1
-
-
Ammons, G.1
Bodík, R.2
Larus, J.R.3
-
46
-
-
22444452019
-
A beam search algorithm for PFSA inference
-
A. Raman, P. Andreae, and J. Patrick, "A Beam Search Algorithm for PFSA Inference," Pattern Analysis and Applications, vol.1, 1998.
-
(1998)
Pattern Analysis and Applications
, vol.1
-
-
Raman, A.1
Andreae, P.2
Patrick, J.3
-
47
-
-
84869679989
-
-
"PFSA Toolkit," http://www.cs.usyd.edu.au/-rcdmnl/PFSA.
-
PFSA Toolkit
-
-
-
48
-
-
34948849748
-
QUARK: Empirical assessment of automaton-based specification miners
-
IEEE Computer Society
-
D. Lo and S. Khoo, "QUARK: Empirical Assessment of Automaton-based Specification Miners," in 13th Working Conference on Reverse Engineering (WCRE). IEEE Computer Society, 2006.
-
(2006)
13th Working Conference on Reverse Engineering (WCRE)
-
-
Lo, D.1
Khoo, S.2
-
53
-
-
84869673613
-
-
"How Samba Was Written," http://samba.org/ftp/tridge/misc/ french-cafe.txt, 2007.
-
(2007)
How Samba was Written
-
-
-
54
-
-
70449682265
-
The protocol informatics project
-
M. Beddoe, "The Protocol Informatics Project," in Toorcon, 2004.
-
(2004)
Toorcon
-
-
Beddoe, M.1
-
55
-
-
0036983315
-
Automatic extraction of object-oriented component interfaces
-
J. Whaley, M. C. Martin, and M. S. Lam, "Automatic Extraction of Object-Oriented Component Interfaces," SIGSOFT Softw. Eng. Notes, vol.27, no.4, 2002.
-
(2002)
SIGSOFT Softw. Eng. Notes
, vol.27
, Issue.4
-
-
Whaley, J.1
Martin, M.C.2
Lam, M.S.3
-
56
-
-
0036041420
-
Bugs as deviant behavior: A general approach to inferring errors in systems code
-
D. Engler, D. Chen, S. Hallem, A. Chou, and B. Chelf, "Bugs as Deviant Behavior: A General Approach to Inferring Errors in Systems Code," in ACM Symposium on Operating Systems Principles, 2001.
-
(2001)
ACM Symposium on Operating Systems Principles
-
-
Engler, D.1
Chen, D.2
Hallem, S.3
Chou, A.4
Chelf, B.5
-
58
-
-
17044362578
-
Synthesis of interface specifications for Java classes
-
R. Alur, P. Černý, P. Madhusudan, and W. Nam, "Synthesis of Interface Specifications for Java Classes," SIGPLAN Not., vol.40, no.1, 2005.
-
(2005)
SIGPLAN Not.
, vol.40
, Issue.1
-
-
Alur, R.1
Černý, P.2
Madhusudan, P.3
Nam, W.4
-
59
-
-
0023453626
-
Learning regular sets from queries and counterexamples
-
D. Angluin, "Learning Regular Sets from Queries and Counterexamples," Inf. Comput., vol.75, no. 2, 1987.
-
(1987)
Inf. Comput.
, vol.75
, Issue.2
-
-
Angluin, D.1
-
63
-
-
34547241782
-
EXE: Automatically generating inputs of death
-
C. Cadar, V. Ganesh, P. M. Pawlowski, D. L. Dill, and D. R. Engler, "EXE: Automatically Generating Inputs of Death," in 13th ACM Conference on Computer and Communications Security (CCS), 2006.
-
(2006)
13th ACM Conference on Computer and Communications Security (CCS)
-
-
Cadar, C.1
Ganesh, V.2
Pawlowski, P.M.3
Dill, D.L.4
Engler, D.R.5
-
65
-
-
33751060454
-
Automatically generating malicious disks using symbolic execution
-
J. Yang, C. Sar, P. Twohey, C. Cadar, and D. Engler, "Automatically Generating Malicious Disks Using Symbolic Execution," in IEEE Security and Privacy, 2006.
-
(2006)
IEEE Security and Privacy
-
-
Yang, J.1
Sar, C.2
Twohey, P.3
Cadar, C.4
Engler, D.5
-
66
-
-
0003037529
-
Reducibility among combinatorial problems
-
Plenum Press
-
R. M. Karp, ""Reducibility Among Combinatorial Problems"," in Complexity of Computer Computations. Plenum Press, 1972.
-
(1972)
Complexity of Computer Computations
-
-
Karp, R.M.1
|