-
6
-
-
0033295259
-
Bro: A system for detecting network intruders in real-time
-
Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer Networks 31(23-24), 2435-2463 (1999)
-
(1999)
Computer Networks
, vol.31
, Issue.23-24
, pp. 2435-2463
-
-
Paxson, V.1
-
7
-
-
33745647290
-
-
Chinchani, R., Berg, E.V.D.: A fast static analysis approach to detect exploit code in network flows. In: Valdes, A., Zamboni, D. (eds.) RAID 2005. LNCS, 3858, pp. 284-308. Springer, Heidelberg (2006)
-
Chinchani, R., Berg, E.V.D.: A fast static analysis approach to detect exploit code in network flows. In: Valdes, A., Zamboni, D. (eds.) RAID 2005. LNCS, vol. 3858, pp. 284-308. Springer, Heidelberg (2006)
-
-
-
-
8
-
-
84869651774
-
-
The Metasploit Project
-
The Metasploit Project: Metasploit, http://www.metasploit.com/
-
Metasploit
-
-
-
9
-
-
70350669099
-
-
Bania, P.: Tapion (2005), http://pb.specialised.info/all/tapion/
-
Bania, P.: Tapion (2005), http://pb.specialised.info/all/tapion/
-
-
-
-
10
-
-
48649084883
-
-
K2: Admmutate (2007), http://www.ktwo.ca/ADMmutate-0.8.4.tar.gz
-
(2007)
K2: Admmutate
-
-
-
11
-
-
70350659097
-
-
Sedalo, M.: Jempiscode (2006), http://goodfellas.shellcode.com.ar/ proyectos.html
-
Sedalo, M.: Jempiscode (2006), http://goodfellas.shellcode.com.ar/ proyectos.html
-
-
-
-
12
-
-
33745670395
-
-
Kruegel, C., Kirda, E., Mutz, D., Robertson, W., Vigna, G.: Polymorphic worm detection using structural information of executables. In: Valdes, A., Zamboni, D. (eds.) RAID 2005. LNCS, 3858, pp. 207-226. Springer, Heidelberg (2006)
-
Kruegel, C., Kirda, E., Mutz, D., Robertson, W., Vigna, G.: Polymorphic worm detection using structural information of executables. In: Valdes, A., Zamboni, D. (eds.) RAID 2005. LNCS, vol. 3858, pp. 207-226. Springer, Heidelberg (2006)
-
-
-
-
13
-
-
33746446345
-
Network-level polymorphic shellcode detection using emulation
-
Büschkes, R, Laskov, P, eds, DIMVA 2006, Springer, Heidelberg
-
Polychronakis, M., Anagnostakis, K.G., Markatos, E.P.: Network-level polymorphic shellcode detection using emulation. In: Büschkes, R., Laskov, P. (eds.) DIMVA 2006. LNCS, vol. 4064, pp. 54-73. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4064
, pp. 54-73
-
-
Polychronakis, M.1
Anagnostakis, K.G.2
Markatos, E.P.3
-
14
-
-
34547448056
-
Finding diversity in remote code injection exploits
-
October, 2006
-
Ma, J., Dunagan, J., Wang, H.J., Savage, S., Voelker, G.M.: Finding diversity in remote code injection exploits. In: Proc. of the 6th ACM SIGCOMM on Internet Measurement IMC 2006, October 2006, pp. 53-64 (2006)
-
(2006)
Proc. of the 6th ACM SIGCOMM on Internet Measurement IMC
, pp. 53-64
-
-
Ma, J.1
Dunagan, J.2
Wang, H.J.3
Savage, S.4
Voelker, G.M.5
-
15
-
-
34748920757
-
Analyzing network traffic to detect self-decrypting exploit code
-
March, 2007
-
Zhang, Q., Reeves, D.S., Ning, P.: Analyzing network traffic to detect self-decrypting exploit code. In: Proc. of the 2nd ASIAN ACM Symposium on Information, Computer and Communications Security ASIACCS 2007, March 2007, pp. 4-12 (2007)
-
(2007)
Proc. of the 2nd ASIAN ACM Symposium on Information, Computer and Communications Security ASIACCS
, pp. 4-12
-
-
Zhang, Q.1
Reeves, D.S.2
Ning, P.3
-
16
-
-
38149093160
-
-
Polychronakis, M., Anagnostakis, K.G., Markatos, E.P.: Emulation-based detection of non-self-contained polymorphic shellcode. In: Kruegel, C., Lippmann, R., Clark, A. (eds.) RAID 2007. LNCS, 4637, pp. 87-106. Springer, Heidelberg (2007)
-
Polychronakis, M., Anagnostakis, K.G., Markatos, E.P.: Emulation-based detection of non-self-contained polymorphic shellcode. In: Kruegel, C., Lippmann, R., Clark, A. (eds.) RAID 2007. LNCS, vol. 4637, pp. 87-106. Springer, Heidelberg (2007)
-
-
-
-
17
-
-
48649100256
-
Spector: Automatically analyzing shell code
-
Borders, K., Prakash, A., Zielinski, M.: Spector: Automatically analyzing shell code. In: Proc. of the 23rd Annual Computer Security Applications Conference ACSAC 2007, pp. 501-514 (2007)
-
(2007)
Proc. of the 23rd Annual Computer Security Applications Conference ACSAC
, pp. 501-514
-
-
Borders, K.1
Prakash, A.2
Zielinski, M.3
-
18
-
-
84868352987
-
-
Linn, C.M., Rajagopalan, M., Baker, S., Collberg, C., Debray, S.K., Hartman, J.: Protecting against unexpected system calls. In: Proc. of the 13th Usenix Security Symposium, August 2005, pp. 239-254 (2005)
-
Linn, C.M., Rajagopalan, M., Baker, S., Collberg, C., Debray, S.K., Hartman, J.: Protecting against unexpected system calls. In: Proc. of the 13th Usenix Security Symposium, August 2005, pp. 239-254 (2005)
-
-
-
-
19
-
-
85027555608
-
-
Wang, X., Pan, C.C., Liu, P., Zhu, S.: SigFree: A Signature-free Buffer Overflow Attack Blocker. In: Proc. of the 15th Usenix Security Symposium, pp. 225-240 (2006)
-
Wang, X., Pan, C.C., Liu, P., Zhu, S.: SigFree: A Signature-free Buffer Overflow Attack Blocker. In: Proc. of the 15th Usenix Security Symposium, pp. 225-240 (2006)
-
-
-
-
20
-
-
34547241782
-
EXE: Automatically generating inputs of death
-
October, 2006
-
Cadar, C., Ganesh, V., Pawlowski, P.M., Dill, D.L., Engler, D.R.: EXE: automatically generating inputs of death. In: Proc. of the 13th ACM Conference on Computer and Communications Security CCS 2006, October 2006, pp. 322-335 (2006)
-
(2006)
Proc. of the 13th ACM Conference on Computer and Communications Security CCS
, pp. 322-335
-
-
Cadar, C.1
Ganesh, V.2
Pawlowski, P.M.3
Dill, D.L.4
Engler, D.R.5
-
21
-
-
34548737161
-
Exploring multiple execution paths for malware analysis
-
May, 2007
-
Moser, A., Kruegel, C., Kirda, E.: Exploring multiple execution paths for malware analysis. In: Proc. of the 2007 IEEE Symposium on Security and Privacy S&P 2007, May 2007, pp. 231-245 (2007)
-
(2007)
Proc. of the 2007 IEEE Symposium on Security and Privacy S&P
, pp. 231-245
-
-
Moser, A.1
Kruegel, C.2
Kirda, E.3
-
22
-
-
58449115871
-
Bitscope: Automatically dissecting malicious binaries
-
Technical Report CMU-CS-07-133, Carnegie Mellon University
-
Brumley, D., Hartwig, C., Kang, M.G., Liang, Z., Newsome, J., Poosankam, P., Song, D., Yin, H.: Bitscope: Automatically dissecting malicious binaries. Technical Report CMU-CS-07-133, Carnegie Mellon University (2007)
-
(2007)
-
-
Brumley, D.1
Hartwig, C.2
Kang, M.G.3
Liang, Z.4
Newsome, J.5
Poosankam, P.6
Song, D.7
Yin, H.8
-
24
-
-
84869658590
-
-
jt: Libdasm (2006), http://www.klake.org/~jt/misc/libdasm-1.5.tar.gz
-
(2006)
-
-
jt1
Libdasm2
-
32
-
-
84870666315
-
-
SecurityFocus: http://securityfocus.com/
-
SecurityFocus
-
-
-
33
-
-
84869654602
-
-
Milw0rm: http://www.milw0rm.com/
-
Milw0rm
-
-
-
35
-
-
46149149532
-
Network-based buffer overflow detection by exploit code analysis
-
Andersson, S., Clark, A., Mohay, G.M.: Network-based buffer overflow detection by exploit code analysis. In: Proc. of the AusCERT Asia Pacific Information Technology Security Conference, pp. 39-53 (2004)
-
(2004)
Proc. of the AusCERT Asia Pacific Information Technology Security Conference
, pp. 39-53
-
-
Andersson, S.1
Clark, A.2
Mohay, G.M.3
-
36
-
-
84978401615
-
Revirt: Enabling intrusion analysis through virtual-machine logging and replay
-
December, 2002
-
Dunlap, G.W., King, S.T., Cinar, S., Basrai, M., Chen, P.M.: Revirt: Enabling intrusion analysis through virtual-machine logging and replay. In: Proc. of the 5th Symposium on Operating Systems Design and Implementation OSDI 2002, December 2002, pp. 211-224 (2002)
-
(2002)
Proc. of the 5th Symposium on Operating Systems Design and Implementation OSDI
, pp. 211-224
-
-
Dunlap, G.W.1
King, S.T.2
Cinar, S.3
Basrai, M.4
Chen, P.M.5
-
37
-
-
33846274224
-
A Framework for Detecting Network-based Code Injection Attacks Targeting Windows and UNIX
-
Andersson, S., Clark, A., Mohay, G.M., Schatz, B., Zimmermann, J.: A Framework for Detecting Network-based Code Injection Attacks Targeting Windows and UNIX. In: Proc. of the 21st Annual Computer Security Applications Conference ACSAC 2005, pp. 49-58 (2005)
-
(2005)
Proc. of the 21st Annual Computer Security Applications Conference ACSAC
, pp. 49-58
-
-
Andersson, S.1
Clark, A.2
Mohay, G.M.3
Schatz, B.4
Zimmermann, J.5
|