-
1
-
-
77952361467
-
-
How Samba Was Written
-
How Samba Was Written. http://samba.org/ftp/tridge/misc/french.cafe.txt.
-
-
-
-
2
-
-
77952331991
-
-
Icqlib: The ICQ Library
-
Icqlib: The ICQ Library. http://kicq.sourceforge.net/icqlib.shtml.
-
-
-
-
3
-
-
77952370826
-
-
Libyahoo2: A C Library for Yahoo! Messenger
-
Libyahoo2: A C Library for Yahoo! Messenger. http://libyahoo2. sourceforge.net.
-
-
-
-
4
-
-
77952395558
-
-
MSN Messenger Protocol
-
MSN Messenger Protocol. http://www.hypothetic.org/docs/msn/index.php.
-
-
-
-
5
-
-
77952404530
-
-
Qemu: Open Source Processor Emulator
-
Qemu: Open Source Processor Emulator. http://fabrice.bellard.free.fr/ qemu/.
-
-
-
-
6
-
-
77952385657
-
-
Tcpdump
-
Tcpdump. http://www.tcpdump.org/.
-
-
-
-
7
-
-
77952325433
-
-
UnOfficial AIM/OSCAR Protocol Specification
-
The UnOfficial AIM/OSCAR Protocol Specification. http://www.oilcan.org/ oscar/.
-
-
-
-
8
-
-
77952382556
-
-
Wireshark, Network Protocol Analyzer
-
Wireshark, Network Protocol Analyzer. http://www.wireshark.org.
-
-
-
-
10
-
-
56549108391
-
Generic application-level protocol analyzer and its language
-
San Diego, CA, February
-
N. Borisov, D. J. Brumley, H. J. Wang, and C. Guo. Generic Application-Level Protocol Analyzer and Its Language. Network and Distributed System Security Symposium, San Diego, CA, February 2007.
-
(2007)
Network and Distributed System Security Symposium
-
-
Borisov, N.1
Brumley, D.J.2
Wang, H.J.3
Guo, C.4
-
11
-
-
85077688456
-
Towards automatic discovery of deviations in binary implementations with applications to error detection and fingerprint generation
-
Boston, MA, August
-
D. Brumley, J. Caballero, Z. Liang, J. Newsome, and D. Song. Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint Generation. USENIX Security Symposium, Boston, MA, August 2007.
-
(2007)
USENIX Security Symposium
-
-
Brumley, D.1
Caballero, J.2
Liang, Z.3
Newsome, J.4
Song, D.5
-
12
-
-
58449114073
-
FiG: Automatic fingerprint generation
-
San Diego, CA, February
-
J. Caballero, S. Venkataraman, P. Poosankam, M. G. Kang, D. Song, and A. Blum. FiG: Automatic Fingerprint Generation. Network and Distributed System Security Symposium, San Diego, CA, February 2007.
-
(2007)
Network and Distributed System Security Symposium
-
-
Caballero, J.1
Venkataraman, S.2
Poosankam, P.3
Kang, M.G.4
Song, D.5
Blum, A.6
-
13
-
-
85084160792
-
Understanding data lifetime via whole system simulation
-
San Diego, CA, August
-
J. Chow, B. Pfaff, T. Garfinkel, K. Christopher, and M. Rosenblum. Understanding Data Lifetime Via Whole System Simulation. USENIX Security Symposium, San Diego, CA, August 2004.
-
(2004)
USENIX Security Symposium
-
-
Chow, J.1
Pfaff, B.2
Garfinkel, T.3
Christopher, K.4
Rosenblum, M.5
-
14
-
-
84885679117
-
Vigilante: End-to-end containment of internet worms
-
Brighton, United Kingdom, October
-
M. Costa, J. Crowcroft, M. Castro, A. Rowstron, L. Zhou, L. Zhang, and P. Barham. Vigilante: End-to-End Containment of Internet Worms. Symposium on Operating Systems Principles, Brighton, United Kingdom, October 2005.
-
(2005)
Symposium on Operating Systems Principles
-
-
Costa, M.1
Crowcroft, J.2
Castro, M.3
Rowstron, A.4
Zhou, L.5
Zhang, L.6
Barham, P.7
-
17
-
-
84893143817
-
Discoverer: Automatic protocol description generation from network traces
-
Boston, MA, August
-
W. Cui, J. Kannan, and H. J. Wang. Discoverer: Automatic Protocol Description Generation from Network Traces. USENIX Security Symposium, Boston, MA, August 2007.
-
(2007)
USENIX Security Symposium
-
-
Cui, W.1
Kannan, J.2
Wang, H.J.3
-
18
-
-
34547159931
-
Protocol-independent adaptive replay of application dialog
-
San Diego, CA, February
-
W. Cui, V. Paxson, N. C. Weaver, and R. H. Katz. Protocol-Independent Adaptive Replay of Application Dialog. Network and Distributed System Security Symposium, San Diego, CA, February 2006.
-
(2006)
Network and Distributed System Security Symposium
-
-
Cui, W.1
Paxson, V.2
Weaver, N.C.3
Katz, R.H.4
-
19
-
-
85077692116
-
Dynamic application-layer protocol analysis for network intrusion detection
-
Vancouver, Canada, July
-
H. Dreger, A. Feldmann, M. Mai, V. Paxson, and R. Sommer. Dynamic Application-Layer Protocol Analysis for Network Intrusion Detection. USENIX Security Symposium, Vancouver, Canada, July 2006.
-
(2006)
USENIX Security Symposium
-
-
Dreger, H.1
Feldmann, A.2
Mai, M.3
Paxson, V.4
Sommer, R.5
-
20
-
-
32444432284
-
Improving network applications security: A new heuristic to generate stress testing data
-
June
-
C. D. Grosso, G. Antoniol, M. D. Penta, P. Galinier, and E. Merlo. Improving Network Applications Security: A New Heuristic to Generate Stress Testing Data. Genetic and Evolutionary Computation Conference, June 2005.
-
(2005)
Genetic and Evolutionary Computation Conference
-
-
Grosso, C.D.1
Antoniol, G.2
Penta, M.D.3
Galinier, P.4
Merlo, E.5
-
21
-
-
29244451861
-
ACAS: Automated construction of application signatures
-
Philadelphia, PA, October
-
P. Haffner, S. Sen, O. Spatscheck, and D. Wang. ACAS: Automated Construction of Application Signatures. ACM SIGCOMM, Workshop on Mining network data, Philadelphia, PA, October 2005.
-
(2005)
ACM SIGCOMM, Workshop on Mining Network Data
-
-
Haffner, P.1
Sen, S.2
Spatscheck, O.3
Wang, D.4
-
22
-
-
34547427252
-
Semi-automated discovery of application session structure
-
Rio de Janeiro, Brazil, October
-
J. Kannan, J. Jung, V. Paxson, and C. E. Koksal. Semi-Automated Discovery of Application Session Structure. Internet Measurement Conference, Rio de Janeiro, Brazil, October 2006.
-
(2006)
Internet Measurement Conference
-
-
Kannan, J.1
Jung, J.2
Paxson, V.3
Koksal, C.E.4
-
23
-
-
33846316416
-
Scriptgen: An automated script generation tool for honeyd
-
Tucson, AZ, December
-
C. Leita, K. Mermoud, and M. Dacier. ScriptGen: An Automated Script Generation Tool for Honeyd. Annual Computer Security Applications Conference, Tucson, AZ, December 2005.
-
(2005)
Annual Computer Security Applications Conference
-
-
Leita, C.1
Mermoud, K.2
Dacier, M.3
-
24
-
-
34948842431
-
Extracting output formats from executables
-
Benevento, Italy, October
-
J. Lim, T. Reps, and B. Liblit. Extracting Output Formats from Executables. Working Conference on Reverse Engineering, Benevento, Italy, October 2006.
-
(2006)
Working Conference on Reverse Engineering
-
-
Lim, J.1
Reps, T.2
Liblit, B.3
-
25
-
-
34249790654
-
Unexpected means of protocol inference
-
Rio de Janeiro, Brazil, October
-
J. Ma, K. Levchenko, C. Kreibich, S. Savage, and G. M. Voelker. Unexpected Means of Protocol Inference. Internet Measurement Conference, Rio de Janeiro, Brazil, October 2006.
-
(2006)
Internet Measurement Conference
-
-
Ma, J.1
Levchenko, K.2
Kreibich, C.3
Savage, S.4
Voelker, G.M.5
-
28
-
-
79953672829
-
Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
-
San Diego, CA, February
-
J. Newsome and D. Song. Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software. Network and Distributed System Security Symposium, San Diego, CA, February 2005.
-
(2005)
Network and Distributed System Security Symposium
-
-
Newsome, J.1
Song, D.2
-
29
-
-
34548729485
-
Vulnerability-specific execution filtering for exploit prevention on commodity software
-
San Diego, CA, February
-
J. Newsome, D. Brumley, and D. Song. Vulnerability-Specific Execution Filtering for Exploit Prevention on Commodity Software. Network and Distributed System Security Symposium, San Diego, CA, February 2006.
-
(2006)
Network and Distributed System Security Symposium
-
-
Newsome, J.1
Brumley, D.2
Song, D.3
-
30
-
-
34547349153
-
Replayer: Automatic protocol replay by binary analysis
-
Alexandria, VA, October
-
J. Newsome, D. Brumley, J. Franklin, and D. Song. Replayer: Automatic Protocol Replay By Binary Analysis. ACM Conference on Computer and Communications Security, Alexandria, VA, October 2006.
-
(2006)
ACM Conference on Computer and Communications Security
-
-
Newsome, J.1
Brumley, D.2
Franklin, J.3
Song, D.4
-
31
-
-
17444400103
-
Violating assumptions with fuzzing
-
March
-
P. Oehlert. Violating Assumptions with Fuzzing. IEEE Security and Privacy, 3 (2), March 2005.
-
(2005)
IEEE Security and Privacy
, vol.3
, Issue.2
-
-
Oehlert, P.1
-
32
-
-
84878700321
-
A first look at modern enterprise traffic
-
Berkeley, CA, October
-
R. Pang, M. Allman, M. Bennett, J. Lee, V. Paxson, and B. Tierney. A First Look At Modern Enterprise Traffic. Internet Measurement Conference, Berkeley, CA, October 2005.
-
(2005)
Internet Measurement Conference
-
-
Pang, R.1
Allman, M.2
Bennett, M.3
Lee, J.4
Paxson, V.5
Tierney, B.6
-
33
-
-
34547396634
-
Binpac: A yacc for writing application protocol parsers
-
Rio de Janeiro, Brazil, October
-
R. Pang, V. Paxson, R. Sommer, and L. Peterson. Binpac: A Yacc for Writing Application Protocol Parsers. Internet Measurement Conference, Rio de Janeiro, Brazil, October 2006.
-
(2006)
Internet Measurement Conference
-
-
Pang, R.1
Paxson, V.2
Sommer, R.3
Peterson, L.4
-
34
-
-
85101182647
-
Argos: An emulator for fingerprinting zero-day attacks for advertised honeypots with automatic signature generation
-
October
-
G. Portokalidis, A. Slowinska, and H. Bos. Argos: An Emulator for Fingerprinting Zero-Day Attacks for Advertised Honeypots with Automatic Signature Generation. ACM SIGOPS Operating Systems Review, 40 (4), October 2006.
-
(2006)
ACM SIGOPS Operating Systems Review
, vol.40
, Issue.4
-
-
Portokalidis, G.1
Slowinska, A.2
Bos, H.3
-
35
-
-
12844267418
-
Secure program execution via dynamic information flow tracking
-
Boston, MA, October
-
G. E. Suh, J. W. Lee, D. Zhang, and S. Devadas. Secure Program Execution Via Dynamic Information Flow Tracking. International Conference on Architectural Support for Programming Languages and Operating Systems, Boston, MA, October 2004.
-
(2004)
International Conference on Architectural Support for Programming Languages and Operating Systems
-
-
Suh, G.E.1
Lee, J.W.2
Zhang, D.3
Devadas, S.4
-
36
-
-
49949088887
-
Cross-site scripting prevention with dynamic data tainting and static analysis
-
San Diego, CA, February
-
P. Vogt, F. Nentwich, N. Jovanovic, E. Kirda, C. Kruegel, and G. Vigna. Cross-Site Scripting Prevention with Dynamic Data Tainting and Static Analysis. Network and Distributed System Security Symposium, San Diego, CA, February 2007.
-
(2007)
Network and Distributed System Security Symposium
-
-
Vogt, P.1
Nentwich, F.2
Jovanovic, N.3
Kirda, E.4
Kruegel, C.5
Vigna, G.6
-
37
-
-
77950788046
-
Panorama: Capturing system-wide information flow for malware detection and analysis
-
Alexandria, VA, October
-
H. Yin, D. Song, E. Manuel, C. Kruegel, and E. Kirda. Panorama: Capturing System-Wide Information Flow for Malware Detection and Analysis. ACM Conference on Computer and Communications Security, Alexandria, VA, October 2007.
-
(2007)
ACM Conference on Computer and Communications Security
-
-
Yin, H.1
Song, D.E.2
Manuel, E.3
Kruegel, C.4
Kirda, E.5
|