-
1
-
-
76649131417
-
-
How Samba Was Written. http://samba.org/ftp/tridge/misc/french cafe.txt.
-
How Samba Was Written
-
-
-
7
-
-
85180532687
-
A generic application-level protocol analyzer and its language
-
San Diego, CA, February
-
N. Borisov, D. Brumley, H. J. Wang, J. Dunagan, P. Joshi, and C. Guo. A generic application-level protocol analyzer and its language. In Proceedings of the 14th Annual Network and Distributed System Security Symposium (NDSS’07), San Diego, CA, February 2007.
-
(2007)
Proceedings of the 14th Annual Network and Distributed System Security Symposium (NDSS’07)
-
-
Borisov, N.1
Brumley, D.2
Wang, H. J.3
Dunagan, J.4
Joshi, P.5
Guo, C.6
-
8
-
-
85077688456
-
Towards automatic discovery of deviations in binary implementations with applications to error detection and fingerprint generation
-
Boston, MA, August
-
D. Brumley, J. Caballero, Z. Liang, J. Newsome, and D. Song. Towards automatic discovery of deviations in binary implementations with applications to error detection and fingerprint generation. In In Proceedings of the 16th USENIX Security Symposium (Security’07), Boston, MA, August 2007.
-
(2007)
Proceedings of the 16th USENIX Security Symposium (Security’07)
-
-
Brumley, D.1
Caballero, J.2
Liang, Z.3
Newsome, J.4
Song, D.5
-
11
-
-
85017025817
-
Minos: Architectural support for protecting control data
-
J. R. Crandall, S. F. Wu, and F. T. Chong. Minos: Architectural support for protecting control data. ACM Trans. Archit. Code Optim., 3(4):359-389, 2006.
-
(2006)
ACM Trans. Archit. Code Optim
, vol.3
, Issue.4
, pp. 359-389
-
-
Crandall, J. R.1
Wu, S. F.2
Chong, F. T.3
-
12
-
-
84893143817
-
Discoverer: Automatic protocol reverse engineering from network traces
-
Boston, MA, August
-
W. Cui, J. Kannan, and H. J. Wang. Discoverer: Automatic protocol reverse engineering from network traces. In Proceedings of the 16th USENIX Security Symposium (Security’ 07), Boston, MA, August 2007.
-
(2007)
Proceedings of the 16th USENIX Security Symposium (Security’ 07)
-
-
Cui, W.1
Kannan, J.2
Wang, H. J.3
-
13
-
-
78249251033
-
Protocolindependent adaptive replay of application dialog
-
San Diego, CA, February
-
W. Cui, V. Paxson, N. Weaver, and R. H. Katz. Protocolindependent adaptive replay of application dialog. In Proceedings of the 13th Annual Network and Distributed System Security Symposium (NDSS’06), San Diego, CA, February 2006.
-
(2006)
Proceedings of the 13th Annual Network and Distributed System Security Symposium (NDSS’06)
-
-
Cui, W.1
Paxson, V.2
Weaver, N.3
Katz, R. H.4
-
14
-
-
34548717095
-
Shieldgen: Automatic data patch generation for unknown vulnerabilities with informed probing
-
Oakland, CA, May
-
W. Cui, M. Peinado, H. J. Wang, and M. Locasto. Shieldgen: Automatic data patch generation for unknown vulnerabilities with informed probing. In In Proceedings of 2007 IEEE Symposium on Security and Privacy, Oakland, CA, May 2007.
-
(2007)
Proceedings of 2007 IEEE Symposium on Security and Privacy
-
-
Cui, W.1
Peinado, M.2
Wang, H. J.3
Locasto, M.4
-
15
-
-
84903607772
-
Dynamic spyware analysis
-
June
-
M. Egele, C. Kruegel, E. Kirda, H. Yin, and D. Song. Dynamic spyware analysis. In Proceedings of the 2007 USENIX Annual Technical Conference (Usenix’07), June 2007.
-
(2007)
Proceedings of the 2007 USENIX Annual Technical Conference (Usenix’07)
-
-
Egele, M.1
Kruegel, C.2
Kirda, E.3
Yin, H.4
Song, D.5
-
18
-
-
33846316416
-
Scriptgen: an automated script generation tool for honeyd
-
Washington, DC, USA
-
C. Leita, K. Mermoud, and M. Dacier. Scriptgen: an automated script generation tool for honeyd. In Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC’05), pages 203-214, Washington, DC, USA, 2005.
-
(2005)
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC’05)
, pp. 203-214
-
-
Leita, C.1
Mermoud, K.2
Dacier, M.3
-
19
-
-
31944440969
-
Pin: building customized program analysis tools with dynamic instrumentation
-
C.-K. Luk, R. Cohn, R. Muth, H. Patil, A. Klauser, G. Lowney, S.Wallace, V. J. Reddi, and K. Hazelwood. Pin: building customized program analysis tools with dynamic instrumentation. In Proceedings of ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI’05), pages 190-200, 2007.
-
(2007)
Proceedings of ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI’05)
, pp. 190-200
-
-
Luk, C.-K.1
Cohn, R.2
Muth, R.3
Patil, H.4
Klauser, A.5
Lowney, G.6
Wallace, S.7
Reddi, V. J.8
Hazelwood, K.9
-
20
-
-
34249790654
-
Unexpected means of protocol inference
-
New York, NY, USA, ACM Press
-
J. Ma, K. Levchenko, C. Kreibich, S. Savage, and G. M. Voelker. Unexpected means of protocol inference. In Proceedings of the 6th ACM SIGCOMM on Internet measurement (IMC’06), pages 313-326, New York, NY, USA, 2006. ACM Press.
-
(2006)
Proceedings of the 6th ACM SIGCOMM on Internet measurement (IMC’06)
, pp. 313-326
-
-
Ma, J.1
Levchenko, K.2
Kreibich, C.3
Savage, S.4
Voelker, G. M.5
-
23
-
-
79953672829
-
Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
-
San Diego, CA, February
-
J. Newsome and D. Song. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In Proceedings of the 14th Annual Network and Distributed System Security Symposium (NDSS’05), San Diego, CA, February 2005.
-
(2005)
Proceedings of the 14th Annual Network and Distributed System Security Symposium (NDSS’05)
-
-
Newsome, J.1
Song, D.2
-
24
-
-
0033295259
-
Bro: A System for Detecting Network Intruders in Real-Time
-
V. Paxson. Bro: A System for Detecting Network Intruders in Real-Time. Computer Networks, 31(23-24):2345-2463, 1999.
-
(1999)
Computer Networks
, vol.31
, Issue.23-24
, pp. 2345-2463
-
-
Paxson, V.1
-
26
-
-
12844267418
-
Secure program execution via dynamic information flow tracking
-
Boston, Massachusetts
-
G. E. Suh, J. W. Lee, D. Zhang, and S. Devadas. Secure program execution via dynamic information flow tracking. In Proceedings of International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS’04), Boston, Massachusetts, 2004.
-
(2004)
Proceedings of International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS’04)
-
-
Suh, G. E.1
Lee, J. W.2
Zhang, D.3
Devadas, S.4
-
27
-
-
84887309913
-
Cross site scripting prevention with dynamic data tainting and static analysis
-
San Diego, CA, February
-
P. Vogt, F. Nentwich, N. Jovanovic, E. Kirda, C. Kruegel, and G. Vigna. Cross site scripting prevention with dynamic data tainting and static analysis. In Proceedings of the 14th Annual Network and Distributed System Security Symposium (NDSS’07), San Diego, CA, February 2007.
-
(2007)
Proceedings of the 14th Annual Network and Distributed System Security Symposium (NDSS’07)
-
-
Vogt, P.1
Nentwich, F.2
Jovanovic, N.3
Kirda, E.4
Kruegel, C.5
Vigna, G.6
-
28
-
-
21844456680
-
Shield: vulnerability-driven network filters for preventing known vulnerability exploits
-
H. J. Wang, C. Guo, D. R. Simon, and A. Zugenmaier. Shield: vulnerability-driven network filters for preventing known vulnerability exploits. In Proceedings of ACM SIGCOMM '04, pages 193-204, 2004.
-
(2004)
Proceedings of ACM SIGCOMM '04
, pp. 193-204
-
-
Wang, H. J.1
Guo, C.2
Simon, D. R.3
Zugenmaier, A.4
-
29
-
-
34547261222
-
Packet vaccine: Black-box exploit detection and signature generation
-
New York, NY, USA, ACM Press
-
X. Wang, Z. Li, J. Xu, M. K. Reiter, C. Kil, and J. Y. Choi. Packet vaccine: Black-box exploit detection and signature generation. In Proceedings of the 13th ACM Conference on Computer and Communication Security (CCS’06), pages 37-46, New York, NY, USA, 2006. ACM Press.
-
(2006)
Proceedings of the 13th ACM Conference on Computer and Communication Security (CCS’06)
, pp. 37-46
-
-
Wang, X.1
Li, Z.2
Xu, J.3
Reiter, M. K.4
Kil, C.5
Choi, J. Y.6
-
31
-
-
77950788046
-
Panorama: Capturing system-wide information flow for malware detection and analysis
-
October
-
H. Yin, D. Song, E. Manuel, C. Kruegel, and E. Kirda. Panorama: Capturing system-wide information flow for malware detection and analysis. In Proceedings of the 14th ACM Conferences on Computer and Communication Security (CCS’07), October 2007.
-
(2007)
Proceedings of the 14th ACM Conferences on Computer and Communication Security (CCS’07)
-
-
Yin, H.1
Song, D.2
Manuel, E.3
Kruegel, C.4
Kirda, E.5
|