-
1
-
-
56449089645
-
-
Symantec: Internet security threat report (2008), http://www.symantec. com/business/theme.jsp?themeid=threatreport
-
(2008)
Internet security threat report
-
-
-
2
-
-
33646048960
-
Honeycomb - creating intrusion detection signatures using honeypots
-
Boston, MA
-
Kreibich, C., Crowcroft, J.: Honeycomb - creating intrusion detection signatures using honeypots. In: Workshop on Hot Topics in Networks, Boston, MA (2003)
-
(2003)
Workshop on Hot Topics in Networks
-
-
Kreibich, C.1
Crowcroft, J.2
-
3
-
-
85084163246
-
Autograph: Toward automated, distributed worm signature detection
-
San Diego, CA
-
Kim, H.A., Karp, B.: Autograph: Toward automated, distributed worm signature detection. In: USENIX Security Symposium, San Diego, CA (2004)
-
(2004)
USENIX Security Symposium
-
-
Kim, H.A.1
Karp, B.2
-
4
-
-
84991765629
-
Automated worm fingerprinting
-
San Francisco, CA
-
Singh, S., Estan, C., Varghese, G., Savage, S.: Automated worm fingerprinting. In: Symposium on Operating System Design and Implementation, San Francisco, CA (2004)
-
(2004)
Symposium on Operating System Design and Implementation
-
-
Singh, S.1
Estan, C.2
Varghese, G.3
Savage, S.4
-
5
-
-
27544498978
-
Polygraph: Automatically generating signatures for polymorphic worms
-
Oakland, CA
-
Newsome, J., Karp, B., Song, D.: Polygraph: Automatically generating signatures for polymorphic worms. In: IEEE Symposium on Security and Privacy, Oakland, CA (2005)
-
(2005)
IEEE Symposium on Security and Privacy
-
-
Newsome, J.1
Karp, B.2
Song, D.3
-
6
-
-
84923445084
-
An architecture for generating semantics-aware signatures
-
Baltimore, MD
-
Yegneswaran, V., Giffin, J.T., Barford, P., Jha, S.: An architecture for generating semantics-aware signatures. In: USENIX Security Symposium, Baltimore, MD (2005)
-
(2005)
USENIX Security Symposium
-
-
Yegneswaran, V.1
Giffin, J.T.2
Barford, P.3
Jha, S.4
-
7
-
-
33751064824
-
Hamsa: Fast signature generation for zero-day polymorphic worms with provable attack resilience
-
Oakland, CA
-
Li, Z., Sanghi, M., Chen, Y., Kao, M.Y., Chavez, B.: Hamsa: Fast signature generation for zero-day polymorphic worms with provable attack resilience. In: IEEE Symposium on Security and Privacy, Oakland, CA (2006)
-
(2006)
IEEE Symposium on Security and Privacy
-
-
Li, Z.1
Sanghi, M.2
Chen, Y.3
Kao, M.Y.4
Chavez, B.5
-
8
-
-
33745800070
-
Fast and automated generation of attack signatures: A basis for building self-protecting servers
-
Alexandria, VA
-
Liang, Z., Sekar, R.: Fast and automated generation of attack signatures: A basis for building self-protecting servers. In: ACM Conference on Computer and Communications Security, Alexandria, VA (2005)
-
(2005)
ACM Conference on Computer and Communications Security
-
-
Liang, Z.1
Sekar, R.2
-
9
-
-
33846294027
-
Automatic generation of buffer overflow attack signatures: An approach based on program behavior models
-
Tucson, AZ
-
Liang, Z., Sekar, R.: Automatic generation of buffer overflow attack signatures: An approach based on program behavior models. In: Annual Computer Security Applications Conference, Tucson, AZ (2005)
-
(2005)
Annual Computer Security Applications Conference
-
-
Liang, Z.1
Sekar, R.2
-
10
-
-
34547261222
-
Packet vaccine: Black-box exploit detection and signature generation
-
Alexandria, VA
-
Wang, X., Li, Z., Xu, J., Reiter, M.K., Kil, C., Choi, J.Y.: Packet vaccine: Black-box exploit detection and signature generation. In: ACM Conference on Computer and Communications Security, Alexandria, VA (2006)
-
(2006)
ACM Conference on Computer and Communications Security
-
-
Wang, X.1
Li, Z.2
Xu, J.3
Reiter, M.K.4
Kil, C.5
Choi, J.Y.6
-
11
-
-
84885679117
-
Vigilante: End-to-end containment of internet worms
-
Brighton, United Kingdom
-
Costa, M., Crowcroft, J., Castro, M., Rowstron, A., Zhou, L., Zhang, L., Barham, P.: Vigilante: End-to-end containment of internet worms. In: Symposium on Operating Systems Principles, Brighton, United Kingdom (2005)
-
(2005)
Symposium on Operating Systems Principles
-
-
Costa, M.1
Crowcroft, J.2
Castro, M.3
Rowstron, A.4
Zhou, L.5
Zhang, L.6
Barham, P.7
-
12
-
-
33751056900
-
Towards automatic generation of vulnerability-based signatures
-
Oakland, CA
-
Brumley, D., Newsome, J., Song, D., Wang, H., Jha, S.: Towards automatic generation of vulnerability-based signatures. In: IEEE Symposium on Security and Privacy, Oakland, CA (2006)
-
(2006)
IEEE Symposium on Security and Privacy
-
-
Brumley, D.1
Newsome, J.2
Song, D.3
Wang, H.4
Jha, S.5
-
13
-
-
85008263148
-
Loop-extended symbolic execution on binary programs
-
Chicago, IL
-
Saxena, P., Poosankam, P., McCamant, S., Song, D.: Loop-extended symbolic execution on binary programs. In: International Symposium on Software Testing and Analysis, Chicago, IL (2009)
-
(2009)
International Symposium on Software Testing and Analysis
-
-
Saxena, P.1
Poosankam, P.2
McCamant, S.3
Song, D.4
-
14
-
-
14844322335
-
Testing network-based intrusion detection signatures using mutant exploits
-
Washington, DC
-
Vigna, G., Robertson, W., Balzarotti, D.: Testing network-based intrusion detection signatures using mutant exploits. In: ACM Conference on Computer and Communications Security, Washington, DC (2004)
-
(2004)
ACM Conference on Computer and Communications Security
-
-
Vigna, G.1
Robertson, W.2
Balzarotti, D.3
-
15
-
-
21644443817
-
Automatic generation and analysis of nids attacks
-
Tucson, AZ
-
Rubin, S., Jha, S., Miller, B.P.: Automatic generation and analysis of nids attacks. In: Annual Computer Security Applications Conference, Tucson, AZ (2004)
-
(2004)
Annual Computer Security Applications Conference
-
-
Rubin, S.1
Jha, S.2
Miller, B.P.3
-
16
-
-
35048885595
-
Creating vulnerability signatures using weakest pre-conditions
-
Venice, Italy
-
Brumley, D., Wang, H., Jha, S., Song, D.: Creating vulnerability signatures using weakest pre-conditions. In: Computer Security Foundations Symposium, Venice, Italy (2007)
-
(2007)
Computer Security Foundations Symposium
-
-
Brumley, D.1
Wang, H.2
Jha, S.3
Song, D.4
-
17
-
-
41149160709
-
Bouncer: Securing software by blocking bad input
-
Bretton Woods, NH
-
Costa, M., Castro, M., Zhou, L., Zhang, L., Peinado, M.: Bouncer: Securing software by blocking bad input. In: Symposium on Operating Systems Principles, Bretton Woods, NH (2007)
-
(2007)
Symposium on Operating Systems Principles
-
-
Costa, M.1
Castro, M.2
Zhou, L.3
Zhang, L.4
Peinado, M.5
-
18
-
-
34548717095
-
Shieldgen: Automatic data patch generation for unknown vulnerabilities with informed probing
-
Oakland, CA
-
Cui, W., Peinado, M., Wang, H.J., Locasto, M.: Shieldgen: Automatic data patch generation for unknown vulnerabilities with informed probing. In: IEEE Symposium on Security and Privacy, Oakland, CA (2007)
-
(2007)
IEEE Symposium on Security and Privacy
-
-
Cui, W.1
Peinado, M.2
Wang, H.J.3
Locasto, M.4
-
19
-
-
50249085491
-
Automatic patch-based exploit generation is possible: Techniques and implications
-
Oakland, CA
-
Brumley, D., Poosankam, P., Song, D., Zheng, J.: Automatic patch-based exploit generation is possible: Techniques and implications. In: IEEE Symposium on Security and Privacy, Oakland, CA (2008)
-
(2008)
IEEE Symposium on Security and Privacy
-
-
Brumley, D.1
Poosankam, P.2
Song, D.3
Zheng, J.4
-
20
-
-
84868185044
-
-
A dumb patch? http://blogs.technet.com/msrc/archive/2005/10/31/413402. aspx
-
A dumb patch
-
-
-
22
-
-
84868167124
-
-
Wireshark, http://www.wireshark.org
-
Wireshark
-
-
-
23
-
-
34547396634
-
Binpac: A yacc for writing application protocol parsers
-
Rio de Janeiro, Brazil
-
Pang, R., Paxson, V., Sommer, R., Peterson, L.: Binpac: A yacc for writing application protocol parsers. In: Internet Measurement Conference, Rio de Janeiro, Brazil (2006)
-
(2006)
Internet Measurement Conference
-
-
Pang, R.1
Paxson, V.2
Sommer, R.3
Peterson, L.4
-
24
-
-
85180532687
-
A generic application-level protocol analyzer and its language
-
San Diego, CA
-
Borisov, N., Brumley, D., Wang, H.J., Dunagan, J., Joshi, P., Guo, C.: A generic application-level protocol analyzer and its language. In: Network and Distributed System Security Symposium, San Diego, CA (2007)
-
(2007)
Network and Distributed System Security Symposium
-
-
Borisov, N.1
Brumley, D.2
Wang, H.J.3
Dunagan, J.4
Joshi, P.5
Guo, C.6
-
25
-
-
77952403312
-
Polyglot: Automatic extraction of protocol message format using dynamic binary analysis
-
Alexandria, VA
-
Caballero, J., Yin, H., Liang, Z., Song, D.: Polyglot: Automatic extraction of protocol message format using dynamic binary analysis. In: ACM Conference on Computer and Communications Security, Alexandria, VA (2007)
-
(2007)
ACM Conference on Computer and Communications Security
-
-
Caballero, J.1
Yin, H.2
Liang, Z.3
Song, D.4
-
26
-
-
70349283250
-
Tupni: Automatic reverse engineering of input formats
-
Alexandria, VA
-
Cui, W., Peinado, M., Chen, K., Wang, H.J., Irun-Briz, L.: Tupni: Automatic reverse engineering of input formats. In: ACM Conference on Computer and Communications Security, Alexandria, VA (2008)
-
(2008)
ACM Conference on Computer and Communications Security
-
-
Cui, W.1
Peinado, M.2
Chen, K.3
Wang, H.J.4
Irun-Briz, L.5
-
27
-
-
85180792232
-
Automatic network protocol analysis
-
San Diego, CA
-
Wondracek, G., Comparetti, P.M., Kruegel, C., Kirda, E.: Automatic network protocol analysis. In: Network and Distributed System Security Symposium, San Diego, CA (2008)
-
(2008)
Network and Distributed System Security Symposium
-
-
Wondracek, G.1
Comparetti, P.M.2
Kruegel, C.3
Kirda, E.4
-
28
-
-
74049090626
-
Automatic protocol format reverse engineering through context-aware monitored execution
-
San Diego, CA
-
Lin, Z., Jiang, X., Xu, D., Zhang, X.: Automatic protocol format reverse engineering through context-aware monitored execution. In: Network and Distributed System Security Symposium, San Diego, CA (2008)
-
(2008)
Network and Distributed System Security Symposium
-
-
Lin, Z.1
Jiang, X.2
Xu, D.3
Zhang, X.4
-
29
-
-
79953672829
-
Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
-
San Diego, CA
-
Newsome, J., Song, D.: Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In: Network and Distributed System Security Symposium, San Diego, CA (2005)
-
(2005)
Network and Distributed System Security Symposium
-
-
Newsome, J.1
Song, D.2
-
30
-
-
34547241782
-
Exe: Automatically generating inputs of death
-
Alexandria, VA
-
Cadar, C., Ganesh, V., Pawlowski, P.M., Dill, D., Engler, D.R.: Exe: Automatically generating inputs of death. In: ACM Conference on Computer and Communications Security, Alexandria, VA (2006)
-
(2006)
ACM Conference on Computer and Communications Security
-
-
Cadar, C.1
Ganesh, V.2
Pawlowski, P.M.3
Dill, D.4
Engler, D.R.5
-
31
-
-
31844450371
-
Dart: Directed automated random testing
-
Chicago, IL
-
Godefroid, P., Klarlund, N., Sen, K.: Dart: Directed automated random testing. In: SIGPLAN Conference on Programming Language Design and Implementation, Chicago, IL (2005)
-
(2005)
SIGPLAN Conference on Programming Language Design and Implementation
-
-
Godefroid, P.1
Klarlund, N.2
Sen, K.3
-
32
-
-
85128730845
-
Automated whitebox fuzz testing
-
San Diego, CA
-
Godefroid, P., Levin, M.Y., Molnar, D.: Automated whitebox fuzz testing. In: Network and Distributed System Security Symposium, San Diego, CA (2008)
-
(2008)
Network and Distributed System Security Symposium
-
-
Godefroid, P.1
Levin, M.Y.2
Molnar, D.3
-
33
-
-
84868172657
-
-
Vine, http://bitblaze.cs.berkeley.edu/vine.html
-
Vine
-
-
-
34
-
-
76649137779
-
-
Caballero, J., McCamant, S., Barth, A., Song, D.: Extracting models of security-sensitive operations using string-enhanced white-box exploration on binaries. Technical Report UCB/EECS-2009-36, EECS Department, University of California, Berkeley (2009)
-
Caballero, J., McCamant, S., Barth, A., Song, D.: Extracting models of security-sensitive operations using string-enhanced white-box exploration on binaries. Technical Report UCB/EECS-2009-36, EECS Department, University of California, Berkeley (2009)
-
-
-
-
35
-
-
58449129985
-
BitBlaze: A new approach to computer security via binary analysis
-
Hyderabad, India , Keynote invited paper
-
Song, D., Brumley, D., Yin, H., Caballero, J., Jager, I., Kang, M.G., Liang, Z., Newsome, J., Poosankam, P., Saxena, P.: BitBlaze: A new approach to computer security via binary analysis. In: International Conference on Information Systems Security, Hyderabad, India (2008); Keynote invited paper
-
(2008)
International Conference on Information Systems Security
-
-
Song, D.1
Brumley, D.2
Yin, H.3
Caballero, J.4
Jager, I.5
Kang, M.G.6
Liang, Z.7
Newsome, J.8
Poosankam, P.9
Saxena, P.10
-
36
-
-
84868171944
-
-
Towards generating high coverage vulnerability-based signatures with protocol-level constraint-guided exploration extended version
-
Towards generating high coverage vulnerability-based signatures with protocol-level constraint-guided exploration (extended version), http://www.ece.cmu.edu/~juanca/papers/fieldsig-extended.pdf
-
-
-
-
37
-
-
57349133785
-
Grammar-based whitebox fuzzing
-
Tucson, AZ
-
Godefroid, P., Kiezun, A., Levin, M.Y.: Grammar-based whitebox fuzzing. In: SIGPLAN Conference on Programming Language Design and Implementation, Tucson, AZ (2008)
-
(2008)
SIGPLAN Conference on Programming Language Design and Implementation
-
-
Godefroid, P.1
Kiezun, A.2
Levin, M.Y.3
-
38
-
-
76649116391
-
Rwset: Attacking path explosion in constraint-based test generation
-
Seattle, WA
-
Boonstoppel, P., Cadar, C., Engler, D.: Rwset: Attacking path explosion in constraint-based test generation. In: International Symposium on Software Testing and Analysis, Seattle, WA (2008)
-
(2008)
International Symposium on Software Testing and Analysis
-
-
Boonstoppel, P.1
Cadar, C.2
Engler, D.3
-
39
-
-
0016543936
-
Guarded commands, nondeterminacy and formal derivation of programs
-
Dijkstra, E.W.: Guarded commands, nondeterminacy and formal derivation of programs. Communications of the ACM 18(8) (1975)
-
(1975)
Communications of the ACM
, vol.18
, Issue.8
-
-
Dijkstra, E.W.1
|