-
1
-
-
84882606900
-
-
K2, admmutate. http://www.ktwo.ca/c/ADMmutate-0.8.4.tar.gz
-
K2, admmutate
-
-
-
2
-
-
59249106693
-
Detecting targeted attacks using shadow honeypots
-
K. Anagnostakis, S. Sidiroglou, P. Akritidis, K. Xinidis, E. Markatos, and A. Keromytis. Detecting targeted attacks using shadow honeypots. In Proceedings in USENIX Security Symposium, 2005.
-
(2005)
Proceedings in USENIX Security Symposium
-
-
Anagnostakis, K.1
Sidiroglou, S.2
Akritidis, P.3
Xinidis, K.4
Markatos, E.5
Keromytis, A.6
-
3
-
-
85084159869
-
Tied, libsafeplus: Tools for runtime buffer overflow protection
-
In, August
-
K. Avijit, P. Gupta, and D. Gupta. Tied, libsafeplus: Tools for runtime buffer overflow protection. In USENIX Security Symposium, August 2004.
-
(2004)
USENIX Security Symposium
-
-
Avijit, K.1
Gupta, P.2
Gupta, D.3
-
7
-
-
33751035317
-
Design space and analysis of worm defense systems
-
In, Full version in CMU TR CMU-CS-05-156
-
D. Brumley, L.-H. Liu, P. Poosank, and D. Song. Design space and analysis of worm defense systems. In Proc of the 2006 ACM Symposium on Information, Computer, and Communication Security (ASIACCS), 2006. Full version in CMU TR CMU-CS-05-156.
-
(2006)
Proc of the 2006 ACM Symposium on Information, Computer, and Communication Security (ASIACCS)
-
-
Brumley, D.1
Liu, L.-H.2
Poosank, P.3
Song, D.4
-
8
-
-
33751056900
-
Towards automatic generation of vulnerability-based signatures
-
D. Brumley, J. Newsome, D. Song, H. Wang, and S. Jha. Towards automatic generation of vulnerability-based signatures. In Proceedings of the IEEE Symposium on Security and Privacy, 2006.
-
(2006)
Proceedings of the IEEE Symposium on Security and Privacy
-
-
Brumley, D.1
Newsome, J.2
Song, D.3
Wang, H.4
Jha, S.5
-
10
-
-
24944574614
-
-
CERT/CC
-
CERT/CC. CERT/CC statistics 1988-2005. h t t p://w w w. c e r t. o r g/s t a t s/c e r t_s t a t s. h t m l.
-
CERT/CC statistics 1988-2005
-
-
-
13
-
-
84885679117
-
Vigilante: End-to-end containment of internet worms
-
In, Oct
-
M. Costa, J. Crowcroft, M. Castro, A. Rowstron, L. Zhou, L. Zhang, and P. Barham. Vigilante: End-to-end containment of internet worms. In Proceedings of the twentieth ACM symposium on Operating systems principles (SOSP), Oct. 2005.
-
(2005)
Proceedings of the twentieth ACM symposium on Operating systems principles (SOSP)
-
-
Costa, M.1
Crowcroft, J.2
Castro, M.3
Rowstron, A.4
Zhou, L.5
Zhang, L.6
Barham, P.7
-
16
-
-
85084160243
-
StackGuard: Automatic adaptive detection and prevention of bufferoverflow attacks
-
In, January
-
C. Cowan, C. Pu, D. Maier, J. Walpole, P. Bakke, S. Beattie, A. Grier, P. Wagle, Q. Zhang, and H. Hinton. StackGuard: automatic adaptive detection and prevention of bufferoverflow attacks. In Proceedings of the 7th USENIX Security Symposium, January 1998.
-
(1998)
Proceedings of the 7th USENIX Security Symposium
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Walpole, J.4
Bakke, P.5
Beattie, S.6
Grier, A.7
Wagle, P.8
Zhang, Q.9
Hinton, H.10
-
17
-
-
33750355107
-
Minos: Architectural support for software security through control data integrity
-
In, December
-
J. R. Crandall and F. Chong. Minos: Architectural support for software security through control data integrity. In International Symposium on Microarchitecture, December 2004.
-
(2004)
International Symposium on Microarchitecture
-
-
Crandall, J.R.1
Chong, F.2
-
19
-
-
84978401615
-
Revirt: Enabling intrusion analysis through virtual-machine logging and replay
-
G. Dunlap, S. King, S. Cinar, M. Basrai, and P. Chen. Revirt: Enabling intrusion analysis through virtual-machine logging and replay. In Proceedings of the 2002 Symposium on Operating System Design and Implementation (OSDI), 2002.
-
(2002)
Proceedings of the 2002 Symposium on Operating System Design and Implementation (OSDI)
-
-
Dunlap, G.1
King, S.2
Cinar, S.3
Basrai, M.4
Chen, P.5
-
21
-
-
84882725555
-
-
Dynamorio. http://www.cag.lcs.mit.edu/dynamorio/.
-
Dynamorio
-
-
-
23
-
-
0003620778
-
-
Addison-Wesley
-
J. Hopcroft, R. Motwani, and J. UUman. Introduction to automata theory, langauges, and computation. Addison-Wesley, 2001.
-
(2001)
Introduction to automata theory, langauges, and computation
-
-
Hopcroft, J.1
Motwani, R.2
Uuman, J.3
-
32
-
-
0742276097
-
Inside the slanmier worm
-
D. Moore, V. Paxson, S. Savage, C. Shannon, S. Stamford, and N. Weaver. Inside the slanmier worm. In IEEE Security and Privacy, volume 1, 2003.
-
(2003)
IEEE Security and Privacy
, vol.1
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Stamford, S.5
Weaver, N.6
-
33
-
-
0742276097
-
Inside the slammer worm
-
D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver. Inside the slammer worm. In IEEE Security and Privacy, volume 1, 2003.
-
(2003)
IEEE Security and Privacy
, vol.1
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Staniford, S.5
Weaver, N.6
-
37
-
-
42549098753
-
Bounds-checking entire programs witiiout recompiling
-
In, Venice, Italy, Jan. (Proceedings not formally published.)
-
N. Nethercote and J. Fitzhardinge. Bounds-checking entire programs witiiout recompiling. In Proceedings of the Second Workshop on Semantics, Program Analysis, and Computing Environments for Memory Management (SPACE 2004), Venice, Italy, Jan. 2004. (Proceedings not formally published.).
-
(2004)
Proceedings of the Second Workshop on Semantics, Program Analysis, and Computing Environments for Memory Management (SPACE 2004)
-
-
Nethercote, N.1
Fitzhardinge, J.2
-
38
-
-
11344255575
-
Valgrind: A program supervision framework
-
In, Boulder, Colorado, USA, July
-
N. Nethercote and J. Seward. Valgrind: A program supervision framework. In Proceedings of the Third Workshop on Runtime Verification (RV'03), Boulder, Colorado, USA, July 2003.
-
(2003)
Proceedings of the Third Workshop on Runtime Verification (RV'03)
-
-
Nethercote, N.1
Seward, J.2
-
40
-
-
84882677711
-
-
Technical Report CMU-CS-05-191, Carnegie Mellon University, February
-
J. Newsome, D. Brumley, D. Song, and M. R. Pariente. Sting: An end-to-end self-healing system for defending against zero-day worm attacks on commodity software. Technical Report CMU-CS-05-191, Carnegie Mellon University, February 2006.
-
(2006)
Sting: An end-to-end self-healing system for defending against zero-day worm attacks on commodity software
-
-
Newsome, J.1
Brumley, D.2
Song, D.3
Pariente, M.R.4
-
44
-
-
56349146235
-
-
Technical Report CMU-CS-04-140, Carnegie Mellon University, May
-
J. Newsome and D. Song. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. Technical Report CMU-CS-04-140, Carnegie Mellon University, May 2005.
-
(2005)
Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
-
-
Newsome, J.1
Song, D.2
-
45
-
-
84882727296
-
-
PaX. http://pax.gr security, net/.
-
PaX
-
-
-
47
-
-
84882601711
-
-
r code
-
r code. ATPhttpd exploit. http://www.cotse.com/mailing-lists/todays/att-0003/01-atphttp0x06.c.
-
ATPhttpd exploit
-
-
-
49
-
-
84906487819
-
Enhancing server availabihty and security through failure-oblivious computing
-
M. Rinard, C. Cadar, D. Dumitran, D. Roy, T. Leu, and W. B. Jr. Enhancing server availabihty and security through failure-oblivious computing. In Operating System Design & Implementation (OSDI), 2004.
-
(2004)
Operating System Design & Implementation (OSDI)
-
-
Rinard, M.1
Cadar, C.2
Dumitran, D.3
Roy, D.4
Leu Jr., T.W.B.5
-
50
-
-
33745775932
-
-
T. J. Robbins. libformat. http://www.securityfocus.com/tools/1818, 2001.
-
(2001)
Libformat
-
-
Robbins, T.J.1
-
52
-
-
14844328033
-
On the effectiveness of address-space randomization
-
In, October
-
H. Shacham, M. Page, B. Pfaff, E.-J. Goh, N. Modadugu, and D. Boneh. On the effectiveness of address-space randomization. In Proceedings of the 11th ACM Conference on Computer and Communications Security, October 2004.
-
(2004)
Proceedings of the 11th ACM Conference on Computer and Communications Security
-
-
Shacham, H.1
Page, M.2
Pfaff, B.3
Goh, E.-J.4
Modadugu, N.5
Boneh, D.6
-
62
-
-
12844267418
-
Secure program execution via dynamic information flow tracking
-
G. E. Suh, J. Lee, and S. Devadas. Secure program execution via dynamic information flow tracking. In Proceedings ofASPLOS, 2004.
-
(2004)
Proceedings ofASPLOS
-
-
Suh, G.E.1
Lee, J.2
Devadas, S.3
-
66
-
-
33750352075
-
Shield: Vulnerability-driven network filters for preventing known vulnerability exploits
-
In, August
-
H. J. Wang, C. Guo, D. Simon, and A. Zugenmaier. Shield: Vulnerability-driven network filters for preventing known vulnerability exploits. In ACM SIGCOMM, August 2004.
-
(2004)
ACM SIGCOMM
-
-
Wang, H.J.1
Guo, C.2
Simon, D.3
Zugenmaier, A.4
-
68
-
-
27644552867
-
-
Technical report. Center for Reliable and Higher Performance Computing, University of Illinois at Urbana-Champaign, May
-
J. Xu, Z. Kalbarczyk, and R. K. Iyer. Transparent runtime randomization for security. Technical report. Center for Reliable and Higher Performance Computing, University of Illinois at Urbana-Champaign, May 2003.
-
(2003)
Transparent runtime randomization for security
-
-
Xu, J.1
Kalbarczyk, Z.2
Iyer, R.K.3
-
69
-
-
33745803872
-
Automatic diagnosis and response to memory corruption vulnerabilities
-
In
-
J. Xu, P. Ning, C. Kil, Y. Zhai, and C. Bookholt. Automatic diagnosis and response to memory corruption vulnerabilities. In Proceedings of the 12th Annual ACM Conference on Computer and Communication Security (CCS), 2005.
-
(2005)
Proceedings of the 12th Annual ACM Conference on Computer and Communication Security (CCS)
-
-
Xu, J.1
Ning, P.2
Kil, C.3
Zhai, Y.4
Bookholt, C.5
|