-
1
-
-
74049083497
-
-
AMD64 architecture tech docs. http://www.amd.com/us-en/Processors/ DevelopWithAMD/0,,30-2252-875-7044,00.html.
-
AMD64 architecture tech docs. http://www.amd.com/us-en/Processors/ DevelopWithAMD/0,,30-2252-875-7044,00.html.
-
-
-
-
2
-
-
76649131417
-
-
How Samba was written. http://samba.org/ftp/tridge/misc/french\-cafe.txt.
-
How Samba was written
-
-
-
4
-
-
74049096423
-
-
Intel64 and IA-32 architectures software developer's manuals
-
Intel64 and IA-32 architectures software developer's manuals. http://www.intel.com/products/processor/manuals/.
-
-
-
-
6
-
-
74049099237
-
-
Libyahoo2: A C library for Yahoo! Messenger. http://libyahoo2. sourceforge.net.
-
Libyahoo2: A C library for Yahoo! Messenger. http://libyahoo2. sourceforge.net.
-
-
-
-
7
-
-
74049105027
-
-
Marshal8e6 security threats: Email and web threats. http://www.marshal. com/newsimages/trace/Marshal8e6-TRACE-Report-Jan2009.pdf.
-
Marshal8e6 security threats: Email and web threats. http://www.marshal. com/newsimages/trace/Marshal8e6-TRACE-Report-Jan2009.pdf.
-
-
-
-
11
-
-
74049111682
-
-
The unofficial AIM/OSCAR protocol specification
-
The unofficial AIM/OSCAR protocol specification. http://www.oilcan.org/ oscar/.
-
-
-
-
12
-
-
74049144647
-
-
Wireshark. http://www.wireshark.org/.
-
Wireshark
-
-
-
13
-
-
4243137229
-
Cyber defense technology networking and evaluation
-
R. Bajcsy, T. Benzel, M. Bishop, B. Braden, C. Brodley, S. Fahmy, S. Floyd, W. Hardaker, A. Joseph, G. Kesidis, K. Levitt, B. Lindell, P. Liu, D. Miller, R. Mundy, C. Neuman, R. Ostrenga, V. Paxson, P. Porras, C. Rosenberg, J. D. Tygar, S. Sastry, D. Sterne, and S. F. Wu. Cyber defense technology networking and evaluation. Communications of the ACM, 47(3), 2004.
-
(2004)
Communications of the ACM
, vol.47
, Issue.3
-
-
Bajcsy, R.1
Benzel, T.2
Bishop, M.3
Braden, B.4
Brodley, C.5
Fahmy, S.6
Floyd, S.7
Hardaker, W.8
Joseph, A.9
Kesidis, G.10
Levitt, K.11
Lindell, B.12
Liu, P.13
Miller, D.14
Mundy, R.15
Neuman, C.16
Ostrenga, R.17
Paxson, V.18
Porras, P.19
Rosenberg, C.20
Tygar, J.D.21
Sastry, S.22
Sterne, D.23
Wu, S.F.24
more..
-
15
-
-
56549108391
-
Generic application-level protocol analyzer and its language
-
San Diego, CA, February
-
N. Borisov, D. J. Brumley, H. J. Wang, and C. Guo. Generic application-level protocol analyzer and its language. In Network and Distributed System Security Symposium, San Diego, CA, February 2007.
-
(2007)
Network and Distributed System Security Symposium
-
-
Borisov, N.1
Brumley, D.J.2
Wang, H.J.3
Guo, C.4
-
16
-
-
74049142183
-
Rosetta: Extracting protocol semantics using binary analysis with applications to protocol replay and NAT rewriting
-
Technical Report CMU-CyLab-07-014, Cylab, Carnegie Mellon University, October
-
J. Caballero and D. Song. Rosetta: Extracting protocol semantics using binary analysis with applications to protocol replay and NAT rewriting. Technical Report CMU-CyLab-07-014, Cylab, Carnegie Mellon University, October 2007.
-
(2007)
-
-
Caballero, J.1
Song, D.2
-
17
-
-
58449114073
-
FiG: Automatic fingerprint generation
-
San Diego, CA, February
-
J. Caballero, S. Venkataraman, P. Poosankam, M. G. Kang, D. Song, and A. Blum. FiG: Automatic fingerprint generation. In Network and Distributed System Security Symposium, San Diego, CA, February 2007.
-
(2007)
Network and Distributed System Security Symposium
-
-
Caballero, J.1
Venkataraman, S.2
Poosankam, P.3
Kang, M.G.4
Song, D.5
Blum, A.6
-
18
-
-
77952403312
-
Polyglot: Automatic extraction of protocol message format using dynamic binary analysis
-
Alexandria, VA, October
-
J. Caballero, H. Yin, Z. Liang, and D. Song. Polyglot: Automatic extraction of protocol message format using dynamic binary analysis. In ACM Conference on Computer and Communications Security, Alexandria, VA, October 2007.
-
(2007)
ACM Conference on Computer and Communications Security
-
-
Caballero, J.1
Yin, H.2
Liang, Z.3
Song, D.4
-
19
-
-
53349116756
-
Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware
-
Anchorage, AK, June
-
X. Chen, J. Andersen, Z. M. Mao, M. Bailey, and J. Nazario. Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware. In International Conference on Dependable Systems and Networks, Anchorage, AK, June 2008.
-
(2008)
International Conference on Dependable Systems and Networks
-
-
Chen, X.1
Andersen, J.2
Mao, Z.M.3
Bailey, M.4
Nazario, J.5
-
21
-
-
85084160792
-
Understanding data lifetime via whole system simulation
-
San Diego, CA, August
-
J. Chow, B. Pfaff, T. Garfinkel, K. Christopher, and M. Rosenblum. Understanding data lifetime via whole system simulation. In USENIX Security Symposium, San Diego, CA, August 2004.
-
(2004)
USENIX Security Symposium
-
-
Chow, J.1
Pfaff, B.2
Garfinkel, T.3
Christopher, K.4
Rosenblum, M.5
-
22
-
-
70350402293
-
Prospex: Protocol specification extraction
-
Oakland, CA, May
-
P. M. Comparetti, G. Wondracek, C. Kruegel, and E. Kirda. Prospex: Protocol specification extraction. In IEEE Symposium on Security and Privacy, Oakland, CA, May 2009.
-
(2009)
IEEE Symposium on Security and Privacy
-
-
Comparetti, P.M.1
Wondracek, G.2
Kruegel, C.3
Kirda, E.4
-
23
-
-
84885679117
-
Vigilante: End-to-end containment of internet worms
-
Brighton, United Kingdom, October
-
M. Costa, J. Crowcroft, M. Castro, A. Rowstron, L. Zhou, L. Zhang, and P. Barham. Vigilante: End-to-end containment of internet worms. In Symposium on Operating Systems Principles, Brighton, United Kingdom, October 2005.
-
(2005)
Symposium on Operating Systems Principles
-
-
Costa, M.1
Crowcroft, J.2
Castro, M.3
Rowstron, A.4
Zhou, L.5
Zhang, L.6
Barham, P.7
-
25
-
-
84893143817
-
Discoverer: Automatic protocol description generation from network traces
-
Boston, MA, August
-
W. Cui, J. Kannan, and H. J. Wang. Discoverer: Automatic protocol description generation from network traces. In USENIX Security Symposium, Boston, MA, August 2007.
-
(2007)
USENIX Security Symposium
-
-
Cui, W.1
Kannan, J.2
Wang, H.J.3
-
26
-
-
34547159931
-
Protocol-independent adaptive replay of application dialog
-
San Diego, CA, February
-
W. Cui, V. Paxson, N. C. Weaver, and R. H. Katz. Protocol-independent adaptive replay of application dialog. In Network and Distributed System Security Symposium, San Diego, CA, February 2006.
-
(2006)
Network and Distributed System Security Symposium
-
-
Cui, W.1
Paxson, V.2
Weaver, N.C.3
Katz, R.H.4
-
27
-
-
70349283250
-
Tupni: Automatic reverse engineering of input formats
-
Alexandria, VA, October
-
W. Cui, M. Peinado, K. Chen, H. J. Wang, and L. Irun-Briz. Tupni: Automatic reverse engineering of input formats. In ACM Conference on Computer and Communications Security, Alexandria, VA, October 2008.
-
(2008)
ACM Conference on Computer and Communications Security
-
-
Cui, W.1
Peinado, M.2
Chen, K.3
Wang, H.J.4
Irun-Briz, L.5
-
28
-
-
74049160166
-
-
N. Daswani, M. Stoppelman, and the Google Click Quality and Security Teams. The anatomy of Clickbot.A. In Workshop on Hot Topics in Understanding Botnets, April 2007.
-
N. Daswani, M. Stoppelman, and the Google Click Quality and Security Teams. The anatomy of Clickbot.A. In Workshop on Hot Topics in Understanding Botnets, April 2007.
-
-
-
-
29
-
-
85077692116
-
Dynamic application-layer protocol analysis for network intrusion detection
-
Vancouver, Canada, July
-
H. Dreger, A. Feldmann, M. Mai, V. Paxson, and R. Sommer. Dynamic application-layer protocol analysis for network intrusion detection. In USENIX Security Symposium, Vancouver, Canada, July 2006.
-
(2006)
USENIX Security Symposium
-
-
Dreger, H.1
Feldmann, A.2
Mai, M.3
Paxson, V.4
Sommer, R.5
-
30
-
-
0003415244
-
Hypertext transfer protocol - HTTP/1.1. RFC 2616 (Draft Standard)
-
June
-
R. Fielding, J. Gettys, J. Mogul, H. Frystyk, L. Masinter, P. Leach, and T. Berners-Lee. Hypertext transfer protocol - HTTP/1.1. RFC 2616 (Draft Standard), June 1999.
-
(1999)
-
-
Fielding, R.1
Gettys, J.2
Mogul, J.3
Frystyk, H.4
Masinter, L.5
Leach, P.6
Berners-Lee, T.7
-
32
-
-
85076932663
-
Studying spamming botnets using Botlab
-
Boston, MA, April
-
J. P. John, A. Moshchuk, S. D. Gribble, and A. Krishnamurthy. Studying spamming botnets using Botlab. In Symposium on Networked System Design and Implementation, Boston, MA, April 2009.
-
(2009)
Symposium on Networked System Design and Implementation
-
-
John, J.P.1
Moshchuk, A.2
Gribble, S.D.3
Krishnamurthy, A.4
-
33
-
-
70349272437
-
Spamalytics: An empirical analysis of spam marketing conversion
-
Alexandria, VA, October
-
C. Kanich, C. Kreibich, K. Levchenko, B. Enright, G. M. Voelker, V. Paxson, and S. Savage. Spamalytics: An empirical analysis of spam marketing conversion. In ACM Conference on Computer and Communications Security, Alexandria, VA, October 2008.
-
(2008)
ACM Conference on Computer and Communications Security
-
-
Kanich, C.1
Kreibich, C.2
Levchenko, K.3
Enright, B.4
Voelker, G.M.5
Paxson, V.6
Savage, S.7
-
34
-
-
34547427252
-
Semi-automated discovery of application session structure
-
Rio de Janeiro, Brazil, October
-
J. Kannan, J. Jung, V. Paxson, and C. E. Koksal. Semi-automated discovery of application session structure. In Internet Measurement Conference, Rio de Janeiro, Brazil, October 2006.
-
(2006)
Internet Measurement Conference
-
-
Kannan, J.1
Jung, J.2
Paxson, V.3
Koksal, C.E.4
-
35
-
-
59249094556
-
Automatic handling of protocol dependencies and reaction to 0-day attacks with ScriptGen based honeypots
-
Hamburg, Germany, September
-
C. Leita, M. Dacier, and F. Massicotte. Automatic handling of protocol dependencies and reaction to 0-day attacks with ScriptGen based honeypots. In International Symposium on Recent Advances in Intrusion Detection, Hamburg, Germany, September 2006.
-
(2006)
International Symposium on Recent Advances in Intrusion Detection
-
-
Leita, C.1
Dacier, M.2
Massicotte, F.3
-
36
-
-
33846316416
-
ScriptGen: An automated script generation tool for Honeyd
-
Tucson, AZ, December
-
C. Leita, K. Mermoud, and M. Dacier. ScriptGen: An automated script generation tool for Honeyd. In Annual Computer Security Applications Conference, Tucson, AZ, December 2005.
-
(2005)
Annual Computer Security Applications Conference
-
-
Leita, C.1
Mermoud, K.2
Dacier, M.3
-
37
-
-
34948842431
-
Extracting output formats from executables
-
Benevento, Italy, October
-
J. Lim, T. Reps, and B. Liblit. Extracting output formats from executables. In Working Conference on Reverse Engineering, Benevento, Italy, October 2006.
-
(2006)
Working Conference on Reverse Engineering
-
-
Lim, J.1
Reps, T.2
Liblit, B.3
-
38
-
-
74049090626
-
Automatic protocol format reverse engineering through context-aware monitored execution
-
San Diego, CA, February
-
Z. Lin, X. Jiang, D. Xu, and X. Zhang. Automatic protocol format reverse engineering through context-aware monitored execution. In Network and Distributed System Security Symposium, San Diego, CA, February 2008.
-
(2008)
Network and Distributed System Security Symposium
-
-
Lin, Z.1
Jiang, X.2
Xu, D.3
Zhang, X.4
-
40
-
-
33751426783
-
Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
-
San Diego, CA, February
-
J. Newsome and D. Song. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In Network and Distributed System Security Symposium, San Diego, CA, February 2005.
-
(2005)
Network and Distributed System Security Symposium
-
-
Newsome, J.1
Song, D.2
-
41
-
-
34547396634
-
-
R. Pang, V. Paxson, R. Sommer, and L. Peterson. binpac: A yacc for writing application protocol parsers. In Internet Measurement Conference, Rio de Janeiro, Brazil, October 2006.
-
R. Pang, V. Paxson, R. Sommer, and L. Peterson. binpac: A yacc for writing application protocol parsers. In Internet Measurement Conference, Rio de Janeiro, Brazil, October 2006.
-
-
-
-
42
-
-
0033295259
-
Bro: A system for detecting network intruders in real-time
-
V. Paxson. Bro: A system for detecting network intruders in real-time. Computer Networks, 31(23-24), 1999.
-
(1999)
Computer Networks
, vol.31
, Issue.23-24
-
-
Paxson, V.1
-
43
-
-
85084094918
-
A foray into Conficker's logic and rendezvous points
-
Boston, MA, April
-
P. Porras, H. Saidi, and V. Yegneswaran. A foray into Conficker's logic and rendezvous points. In USENIX Workshop on Large-Scale Exploits and Emergent Threats, Boston, MA, April 2009.
-
(2009)
USENIX Workshop on Large-Scale Exploits and Emergent Threats
-
-
Porras, P.1
Saidi, H.2
Yegneswaran, V.3
-
44
-
-
0004246059
-
-
October, Updated by RFCs 2228, 2640, 2773, 3659
-
J. Postel and J. Reynolds. File transfer protocol. RFC 959 (Standard), October 1985. Updated by RFCs 2228, 2640, 2773, 3659.
-
(1985)
File transfer protocol. RFC 959 (Standard)
-
-
Postel, J.1
Reynolds, J.2
-
45
-
-
85008263148
-
Loop-extended symbolic execution on binary programs
-
Chicago, IL, July
-
P. Saxena, P. Poosankam, S. McCamant, and D. Song. Loop-extended symbolic execution on binary programs. In International Symposium on Software Testing and Analysis, Chicago, IL, July 2009.
-
(2009)
International Symposium on Software Testing and Analysis
-
-
Saxena, P.1
Poosankam, P.2
McCamant, S.3
Song, D.4
-
46
-
-
12844267418
-
Secure program execution via dynamic information flow tracking
-
Boston, MA, October
-
G. E. Suh, J. W. Lee, D. Zhang, and S. Devadas. Secure program execution via dynamic information flow tracking. In International Conference on Architectural Support for Programming Languages and Operating Systems, Boston, MA, October 2004.
-
(2004)
International Conference on Architectural Support for Programming Languages and Operating Systems
-
-
Suh, G.E.1
Lee, J.W.2
Zhang, D.3
Devadas, S.4
-
47
-
-
84885575254
-
Scalability, fidelity, and containment in the Potemkin virtual honeyfarm
-
Brighton, United Kingdom, October
-
M. Vrable, J. Ma, J. Chen, D. Moore, E. Vandekieft, A. C. Snoeren, G. M. Voelker, and S. Savage. Scalability, fidelity, and containment in the Potemkin virtual honeyfarm. In Symposium on Operating Systems Principles, Brighton, United Kingdom, October 2005.
-
(2005)
Symposium on Operating Systems Principles
-
-
Vrable, M.1
Ma, J.2
Chen, J.3
Moore, D.4
Vandekieft, E.5
Snoeren, A.C.6
Voelker, G.M.7
Savage, S.8
-
48
-
-
81855221759
-
ReFormat: Automatic reverse engineering of encrypted messages
-
Saint-Malo, France, September
-
Z. Wang, X. Jiang, W. Cui, and X. Wang. ReFormat: Automatic reverse engineering of encrypted messages. In European Symposium on Research in Computer Security, Saint-Malo, France, September 2009.
-
(2009)
European Symposium on Research in Computer Security
-
-
Wang, Z.1
Jiang, X.2
Cui, W.3
Wang, X.4
-
49
-
-
56549114981
-
Automatic network protocol analysis
-
San Diego, CA, February
-
G. Wondracek, P. M. Comparetti, C. Kruegel, and E. Kirda. Automatic network protocol analysis. In Network and Distributed System Security Symposium, San Diego, CA, February 2008.
-
(2008)
Network and Distributed System Security Symposium
-
-
Wondracek, G.1
Comparetti, P.M.2
Kruegel, C.3
Kirda, E.4
|