-
1
-
-
49949109144
-
Candid: Preventing sql injection attacks using dynamic candidate evaluations
-
ACM, New York
-
Bandhakavi, S., Bisht, P., Madhusudan, P., Venkatakrishnan, V.N.: Candid: preventing sql injection attacks using dynamic candidate evaluations. In: CCS 2007: Proceedings of the 14th ACM conference on Computer and communications security, pp. 12-24. ACM, New York (2007)
-
(2007)
CCS 2007: Proceedings of the 14th ACM conference on Computer and communications security
, pp. 12-24
-
-
Bandhakavi, S.1
Bisht, P.2
Madhusudan, P.3
Venkatakrishnan, V.N.4
-
2
-
-
18744376889
-
Randomized instruction set emulation to disrupt binary code injection attacks
-
ACM, New York
-
Barrantes, E.G., Ackley, D.H., Palmer, T.S., Stefanovic, D., Zovi, D.D.: Randomized instruction set emulation to disrupt binary code injection attacks. In: CCS 2003: Proceedings of the 10th ACM conference on Computer and communications security, pp. 281-289. ACM, New York (2003)
-
(2003)
CCS 2003: Proceedings of the 10th ACM conference on Computer and communications security
, pp. 281-289
-
-
Barrantes, E.G.1
Ackley, D.H.2
Palmer, T.S.3
Stefanovic, D.4
Zovi, D.D.5
-
3
-
-
84862209017
-
Address obfuscation: An efficient approach to combat a board range of memory error exploits
-
Berkeley, CA, USA, p, USENIX Association
-
Bhatkar, S., DuVarney, D.C., Sekar, R.: Address obfuscation: an efficient approach to combat a board range of memory error exploits. In: SSYM 2003: Proceedings of the 12th conference on USENIX Security Symposium, Berkeley, CA, USA, p. 8 (2003), USENIX Association
-
(2003)
SSYM 2003: Proceedings of the 12th conference on USENIX Security Symposium
, pp. 8
-
-
Bhatkar, S.1
DuVarney, D.C.2
Sekar, R.3
-
4
-
-
84886393009
-
-
Cox, B., Evans, D., Filipi, A., Rowanhill, J., Hu, W., Davidson, J., Knight, J., Nguyen-Tuong, A., Hiser, J.: N-variant systems - A secretless framework for security through diversity. In: Proceedings of the 15th USENIX Security Symposium (August 2006)
-
Cox, B., Evans, D., Filipi, A., Rowanhill, J., Hu, W., Davidson, J., Knight, J., Nguyen-Tuong, A., Hiser, J.: N-variant systems - A secretless framework for security through diversity. In: Proceedings of the 15th USENIX Security Symposium (August 2006)
-
-
-
-
5
-
-
70350690982
-
-
Dhamankar, R.: SANS Top-20 Security Risks (2007), http://www.sans.org/ top20/2007/
-
Dhamankar, R.: SANS Top-20 Security Risks (2007), http://www.sans.org/ top20/2007/
-
-
-
-
7
-
-
70350670140
-
-
Fyodor, G.L.: Remote os detection via tcp/ip stack fingerprinting. Technical report, INSECURE.ORG (October 1998)
-
Fyodor, G.L.: Remote os detection via tcp/ip stack fingerprinting. Technical report, INSECURE.ORG (October 1998)
-
-
-
-
8
-
-
33745665056
-
-
Gao, D., Reiter, M.K., Song, D.: Behavioral distance for intrusion detection. In: Valdes, A., Zamboni, D. (eds.) RAID 2005. LNCS, 3858, pp. 63-81. Springer, Heidelberg (2006)
-
Gao, D., Reiter, M.K., Song, D.: Behavioral distance for intrusion detection. In: Valdes, A., Zamboni, D. (eds.) RAID 2005. LNCS, vol. 3858, pp. 63-81. Springer, Heidelberg (2006)
-
-
-
-
9
-
-
33750379862
-
-
Gao, D., Reiter, M.K., Song, D.: Behavioral distance measurement using hidden markov models. In: Zamboni, D., Krügel, C. (eds.) RAID 2006. LNCS, 4219, pp. 19-40. Springer, Heidelberg (2006)
-
Gao, D., Reiter, M.K., Song, D.: Behavioral distance measurement using hidden markov models. In: Zamboni, D., Krügel, C. (eds.) RAID 2006. LNCS, vol. 4219, pp. 19-40. Springer, Heidelberg (2006)
-
-
-
-
10
-
-
70350667357
-
-
Gao, D., Reiter, M.K., Song, D.: Beyond output voting: Detecting compromised replicas using HMM-based behavioral distance. IEEE Transactions on Dependable and Secure Computing (TDSC) (July 2008)
-
Gao, D., Reiter, M.K., Song, D.: Beyond output voting: Detecting compromised replicas using HMM-based behavioral distance. IEEE Transactions on Dependable and Secure Computing (TDSC) (July 2008)
-
-
-
-
11
-
-
36248952641
-
Fault tolerance via diversity for off-the-shelf products: A study with sql database servers
-
Member-Lorenzo Strigini
-
Gashi, I., Popov, P.: Fault tolerance via diversity for off-the-shelf products: A study with sql database servers. IEEE Transactions on Dependable Secure Computing 4(4), 280-294 (2007); Member-Lorenzo Strigini
-
(2007)
IEEE Transactions on Dependable Secure Computing
, vol.4
, Issue.4
, pp. 280-294
-
-
Gashi, I.1
Popov, P.2
-
12
-
-
70350694715
-
-
Geer, D., Bace, R., Gutmann, P., Metzger, P., Pfleeger, C.P., Quarterman, J.S., Schneier, B.: Cyberinsecurity: The cost of monopoly. Technical report, CCIA (2003)
-
Geer, D., Bace, R., Gutmann, P., Metzger, P., Pfleeger, C.P., Quarterman, J.S., Schneier, B.: Cyberinsecurity: The cost of monopoly. Technical report, CCIA (2003)
-
-
-
-
13
-
-
50049083384
-
Preventing Cross Site Request Forgery Attacks
-
Jovanovic, N., Kirda, E., Kruegel, C.: Preventing Cross Site Request Forgery Attacks. In: IEEE International Conference on Security and Privacy for Emerging Areas in Communication Networks, Securecomm (2006)
-
(2006)
IEEE International Conference on Security and Privacy for Emerging Areas in Communication Networks, Securecomm
-
-
Jovanovic, N.1
Kirda, E.2
Kruegel, C.3
-
14
-
-
84958977234
-
-
Just, J.E., Reynolds, J.C., Clough, L.A., Danforth, M., Levitt, K.N., Maglich, R., Rowe, J.: Learning unknown attacks - A start. In: Wespi, A., Vigna, G., Deri, L. (eds.) RAID 2002. LNCS, 2516, pp. 158-176. Springer, Heidelberg (2002)
-
Just, J.E., Reynolds, J.C., Clough, L.A., Danforth, M., Levitt, K.N., Maglich, R., Rowe, J.: Learning unknown attacks - A start. In: Wespi, A., Vigna, G., Deri, L. (eds.) RAID 2002. LNCS, vol. 2516, pp. 158-176. Springer, Heidelberg (2002)
-
-
-
-
15
-
-
14844317200
-
Countering code-injection attacks with instruction-set randomization
-
ACM Press, New York
-
Kc, G.S., Keromytis, A.D., Prevelakis, V.: Countering code-injection attacks with instruction-set randomization. In: CCS 2003: Proceedings of the 10th ACM conference on Computer and communications security, pp. 272-280. ACM Press, New York (2003)
-
(2003)
CCS 2003: Proceedings of the 10th ACM conference on Computer and communications security
, pp. 272-280
-
-
Kc, G.S.1
Keromytis, A.D.2
Prevelakis, V.3
-
16
-
-
0032740068
-
Systematic generation of stochastic diversity as an intrusion barrier in survivable systems software
-
Washington, DC, USA, IEEE Computer Society, Los Alamitos
-
Linger, R.C.: Systematic generation of stochastic diversity as an intrusion barrier in survivable systems software. In: HICSS 1999: Proceedings of the Thirty-Second Annual Hawaii International Conference on System Sciences, Washington, DC, USA, 1999, vol. 3, p. 3062. IEEE Computer Society, Los Alamitos (1999)
-
(1999)
HICSS 1999: Proceedings of the Thirty-Second Annual Hawaii International Conference on System Sciences
, vol.3
, pp. 3062
-
-
Linger, R.C.1
-
18
-
-
0036931592
-
The design and implementation of an intrusion tolerant system
-
Reynolds, J., Just, J., Lawson, E., Clough, L., Maglich, R.: The design and implementation of an intrusion tolerant system. In: Proceedings of the 2002 International Conference on Dependable Systems and Networks (DSN 2002) (2002)
-
(2002)
Proceedings of the 2002 International Conference on Dependable Systems and Networks (DSN
-
-
Reynolds, J.1
Just, J.2
Lawson, E.3
Clough, L.4
Maglich, R.5
-
19
-
-
0016572913
-
A vector space model for automatic indexing
-
Salton, G., Wong, A., Yang, C.S.: A vector space model for automatic indexing. Communications of the ACM 18(11), 613-620 (1975)
-
(1975)
Communications of the ACM
, vol.18
, Issue.11
, pp. 613-620
-
-
Salton, G.1
Wong, A.2
Yang, C.S.3
-
20
-
-
70350670139
-
-
Singh, A.: Mac OS X Internals: A Systems Approach. Addison-Wesley, Reading (2006)
-
Singh, A.: Mac OS X Internals: A Systems Approach. Addison-Wesley, Reading (2006)
-
-
-
-
21
-
-
4243066282
-
Risks of monoculture
-
Stamp, M.: Risks of monoculture. Communications of the ACM 47(3), 120 (2004)
-
(2004)
Communications of the ACM
, vol.47
, Issue.3
, pp. 120
-
-
Stamp, M.1
-
22
-
-
33745650701
-
-
Totel, E., Majorczyk, F., Me, L.: COTS diversity based intrusion detection and application to web servers. In: Valdes, A., Zamboni, D. (eds.) RAID 2005. LNCS, 3858, pp. 43-62. Springer, Heidelberg (2006)
-
Totel, E., Majorczyk, F., Me, L.: COTS diversity based intrusion detection and application to web servers. In: Valdes, A., Zamboni, D. (eds.) RAID 2005. LNCS, vol. 3858, pp. 43-62. Springer, Heidelberg (2006)
-
-
-
-
23
-
-
70350669124
-
An overview of remote operating system fingerprinting
-
Technical report, The SANS Institute July
-
Trowbridge, C.: An overview of remote operating system fingerprinting. Technical report, The SANS Institute (July 2003)
-
(2003)
-
-
Trowbridge, C.1
-
24
-
-
70350659121
-
-
Vogt, P., Nentwich, F., Jovanovic, N., Kirda, E., Kruegel, C., Vigna, G.: Cross-site scripting prevention with dynamic data tainting and static analysis. In: Proceeding of the Network and Distributed System Security Symposium (NDSS) (February 2007)
-
Vogt, P., Nentwich, F., Jovanovic, N., Kirda, E., Kruegel, C., Vigna, G.: Cross-site scripting prevention with dynamic data tainting and static analysis. In: Proceeding of the Network and Distributed System Security Symposium (NDSS) (February 2007)
-
-
-
|