-
1
-
-
49949109144
-
Candid: Preventing sql injection attacks using dynamic candidate evaluations
-
New York, NY, USA, ACM
-
S. Bandhakavi, P. Bisht, P. Madhusudan, and V. N. Venkatakrishnan. Candid: preventing sql injection attacks using dynamic candidate evaluations. In CCS '07: Proceedings of the 14th ACM conference on Computer and communications security, pages 12-24, New York, NY, USA, 2007. ACM.
-
(2007)
CCS '07: Proceedings of the 14th ACM Conference on Computer and Communications Security
, pp. 12-24
-
-
Bandhakavi, S.1
Bisht, P.2
Madhusudan, P.3
Venkatakrishnan, V.N.4
-
2
-
-
77954467828
-
-
L. Beijing Rising International Software Co. h1. November
-
L. Beijing Rising International Software Co. Internet security report for china mainland, 2009 h1. http://it.rising.com.cn/new2008/News/NewsInfo/2009-07- 21/1248160663d53890.shtml, November 2008.
-
(2008)
Internet Security Report for China Mainland, 2009 H1
-
-
-
3
-
-
49949119476
-
XSS-GUARD: Precise dynamic prevention of cross-site scripting attacks
-
Detection of Intrusions and Malware, and Vulnerability Assessment, Springer Berlin / Heidelberg
-
P. Bisht and V. N. Venkatakrishnan. XSS-GUARD: Precise dynamic prevention of cross-site scripting attacks. In Detection of Intrusions and Malware, and Vulnerability Assessment, volume 5137 of Lecture Notes in Computer Science, pages 23-43. Springer Berlin / Heidelberg, 2008.
-
(2008)
Lecture Notes in Computer Science
, vol.5137
, pp. 23-43
-
-
Bisht, P.1
Venkatakrishnan, V.N.2
-
4
-
-
33751056900
-
Towards automatic generation of Vulnerability-Based signatures
-
IEEE Computer Society
-
D. Brumley, J. Newsome, D. Song, H. Wang, and S. Jha. Towards automatic generation of Vulnerability-Based signatures. In Proceedings of the 2006 IEEE Symposium on Security and Privacy, pages 2-16. IEEE Computer Society, 2006.
-
(2006)
Proceedings of the 2006 IEEE Symposium on Security and Privacy
, pp. 2-16
-
-
Brumley, D.1
Newsome, J.2
Song, D.3
Wang, H.4
Jha, S.5
-
6
-
-
34548717095
-
Shieldgen: Automatic data patch generation for unknown vulnerabilities with informed probing
-
Washington, DC, USA, IEEE Computer Society
-
W. Cui, M. Peinado, H. J. Wang, and M. E. Locasto. Shieldgen: Automatic data patch generation for unknown vulnerabilities with informed probing. In SP '07: Proceedings of the 2007 IEEE Symposium on Security and Privacy, pages 252-266, Washington, DC, USA, 2007. IEEE Computer Society.
-
(2007)
SP '07: Proceedings of the 2007 IEEE Symposium on Security and Privacy
, pp. 252-266
-
-
Cui, W.1
Peinado, M.2
Wang, H.J.3
Locasto, M.E.4
-
7
-
-
48649089769
-
A taxonomy of botnet structures
-
0
-
D. Dagon, G. Gu, C. P. Lee, and W. Lee. A taxonomy of botnet structures. Computer Security Applications Conference, Annual, 0:325-339, 2007.
-
(2007)
Computer Security Applications Conference, Annual
, pp. 325-339
-
-
Dagon, D.1
Gu, G.2
Lee, C.P.3
Lee, W.4
-
13
-
-
70350626575
-
Defending browsers against drive-by downloads: Mitigating heap-spraying code injection attacks
-
M. Egele, P. Wurzinger, C. Kruegel, and E. Kirda. Defending browsers against drive-by downloads: Mitigating heap-spraying code injection attacks. In DIMVA '09: Proceedings of the 6th international conference on Detection of Intrusions and Malware, and Vulnerability Assessment, July 2009.
-
DIMVA '09: Proceedings of the 6th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, July 2009
-
-
Egele, M.1
Wurzinger, P.2
Kruegel, C.3
Kirda, E.4
-
15
-
-
50249182906
-
Secure web browsing with the op web browser
-
0
-
C. Grier, S. Tang, and S. T. King. Secure web browsing with the op web browser. Security and Privacy, IEEE Symposium on, 0:402-416, 2008.
-
(2008)
Security and Privacy, IEEE Symposium on
, pp. 402-416
-
-
Grier, C.1
Tang, S.2
King, S.T.3
-
16
-
-
77952407110
-
Amnesia: Analysis and monitoring for neutralizing sql-injection attacks
-
New York, NY, USA, ACM
-
W. G. J. Halfond and A. Orso. Amnesia: analysis and monitoring for neutralizing sql-injection attacks. In ASE '05: Proceedings of the 20th IEEE/ACM international Conference on Automated software engineering, pages 174-183, New York, NY, USA, 2005. ACM.
-
(2005)
ASE '05: Proceedings of the 20th IEEE/ACM International Conference on Automated Software Engineering
, pp. 174-183
-
-
Halfond, W.G.J.1
Orso, A.2
-
17
-
-
34547379435
-
Using positive tainting and syntax-aware evaluation to counter sql injection attacks
-
New York, NY, USA, ACM
-
W. G. J. Halfond, A. Orso, and P. Manolios. Using positive tainting and syntax-aware evaluation to counter sql injection attacks. In SIGSOFT '06/FSE-14: Proceedings of the 14th ACM SIGSOFT international symposium on Foundations of software engineering, pages 175-185, New York, NY, USA, 2006. ACM.
-
(2006)
SIGSOFT '06/FSE-14: Proceedings of the 14th ACM SIGSOFT International Symposium on Foundations of Software Engineering
, pp. 175-185
-
-
Halfond, W.G.J.1
Orso, A.2
Manolios, P.3
-
18
-
-
84874905168
-
-
G. Inc.
-
G. Inc. Google safe browsing api. http://code.google.com/apis/ safebrowsing/.
-
Google Safe Browsing Api
-
-
-
19
-
-
70349272437
-
Spamalytics: An empirical analysis of spam marketing conversion
-
New York, NY, USA, ACM
-
C. Kanich, C. Kreibich, K. Levchenko, B. Enright, G. M. Voelker, V. Paxson, and S. Savage. Spamalytics: an empirical analysis of spam marketing conversion. In CCS '08: Proceedings of the 15th ACM conference on Computer and communications security, pages 3-14, New York, NY, USA, 2008. ACM.
-
(2008)
CCS '08: Proceedings of the 15th ACM Conference on Computer and Communications Security
, pp. 3-14
-
-
Kanich, C.1
Kreibich, C.2
Levchenko, K.3
Enright, B.4
Voelker, G.M.5
Paxson, V.6
Savage, S.7
-
20
-
-
77954477598
-
-
U. C. S. Lab.
-
U. C. S. Lab. Wepawet. http://wepawet.iseclab.org/.
-
Wepawet
-
-
-
21
-
-
33745205813
-
Inferring internet denial-of-service activity
-
D. Moore, C. Shannon, D. J. Brown, G. M. Voelker, and S. Savage. Inferring internet denial-of-service activity. ACM Trans. Comput. Syst., 24(2):115-139, 2006.
-
(2006)
ACM Trans. Comput. Syst.
, vol.24
, Issue.2
, pp. 115-139
-
-
Moore, D.1
Shannon, C.2
Brown, D.J.3
Voelker, G.M.4
Savage, S.5
-
25
-
-
84871349041
-
Automatically hardening web applications using precise tainting
-
Security and Privacy in the Age of Ubiquitous Computing, Springer Boston
-
A. Nguyen-Tuong, S. Guarnieri, D. Greene, J. Shirley, and D. Evans. Automatically hardening web applications using precise tainting. In Security and Privacy in the Age of Ubiquitous Computing, volume 181 of IFIP International Federation for Information Processing, pages 295-307. Springer Boston, 2005.
-
(2005)
IFIP International Federation for Information Processing
, vol.181
, pp. 295-307
-
-
Nguyen-Tuong, A.1
Guarnieri, S.2
Greene, D.3
Shirley, J.4
Evans, D.5
-
26
-
-
33745661661
-
Defending against injection attacks through context-sensitive string evaluation
-
Recent Advances in Intrusion Detection, Springer Berlin / Heidelberg
-
T. Pietraszek and C. V. Berghe. Defending against injection attacks through context-sensitive string evaluation. In Recent Advances in Intrusion Detection, volume 3858 of Lecture Notes in Computer Science, pages 124-145. Springer Berlin / Heidelberg, 2006.
-
(2006)
Lecture Notes in Computer Science
, vol.3858
, pp. 124-145
-
-
Pietraszek, T.1
Berghe, C.V.2
-
27
-
-
4344593013
-
Beyond stack smashing: Recent advances in exploiting buffer overruns
-
J. Pincus and B. Baker. Beyond stack smashing: Recent advances in exploiting buffer overruns. IEEE Security and Privacy, 2(4):20-27, 2004.
-
(2004)
IEEE Security and Privacy
, vol.2
, Issue.4
, pp. 20-27
-
-
Pincus, J.1
Baker, B.2
-
28
-
-
38149093160
-
Emulation-based detection of non-self-contained polymorphic shellcode
-
Recent Advances in Intrusion Detection, Springer Berlin / Heidelberg
-
M. Polychronakis, K. G. Anagnostakis, and E. P. Markatos. Emulation-based detection of non-self-contained polymorphic shellcode. In Recent Advances in Intrusion Detection, volume 4637 of Lecture Notes in Computer Science, pages 87-106. Springer Berlin / Heidelberg, 2007.
-
(2007)
Lecture Notes in Computer Science
, vol.4637
, pp. 87-106
-
-
Polychronakis, M.1
Anagnostakis, K.G.2
Markatos, E.P.3
-
29
-
-
33846855150
-
Network-level polymorphic shellcode detection using emulation
-
February
-
M. Polychronakis, K. G. Anagnostakis, and E. P. Markatos. Network-level polymorphic shellcode detection using emulation. Journal in Computer Virology, 2(4):257-274, February 2007.
-
(2007)
Journal in Computer Virology
, vol.2
, Issue.4
, pp. 257-274
-
-
Polychronakis, M.1
Anagnostakis, K.G.2
Markatos, E.P.3
-
31
-
-
80053650188
-
All your iframes point to us
-
Berkeley, CA, USA, USENIX Association
-
N. Provos, P. Mavrommatis, M. A. Rajab, and F. Monrose. All your iframes point to us. In Security '08: Proceedings of the 17th Usenix Security Symposium, pages 1-15, Berkeley, CA, USA, 2008. USENIX Association.
-
(2008)
Security '08: Proceedings of the 17th Usenix Security Symposium
, pp. 1-15
-
-
Provos, N.1
Mavrommatis, P.2
Rajab, M.A.3
Monrose, F.4
-
32
-
-
85080711655
-
The ghost in the browser analysis of web-based malware
-
Berkeley, CA, USA, USENIX Association.
-
N. Provos, D. McNamee, P. Mavrommatis, K. Wang, and N. Modadugu. The ghost in the browser analysis of web-based malware. In HotBots'07: Proceedings of the rst conference on First Workshop on Hot Topics in Understanding Botnets, pages 4-4, Berkeley, CA, USA, 2007. USENIX Association.
-
(2007)
HotBots'07: Proceedings of the Rst Conference on First Workshop on Hot Topics in Understanding Botnets
, pp. 4-4
-
-
Provos, N.1
McNamee, D.2
Mavrommatis, P.3
Wang, K.4
Modadugu, N.5
-
34
-
-
34848907433
-
Browsershield: Vulnerability-driven filtering of dynamic html
-
C. Reis, J. Dunagan, H. J. Wang, O. Dubrovsky, and S. Esmeir. Browsershield: Vulnerability-driven filtering of dynamic html. ACM Trans. Web, 1(3):11, 2007.
-
(2007)
ACM Trans. Web
, vol.1
, Issue.3
, pp. 11
-
-
Reis, C.1
Dunagan, J.2
Wang, H.J.3
Dubrovsky, O.4
Esmeir, S.5
-
35
-
-
77954524365
-
-
Secunia. 2008 report. http://secunia.com/gfx/Secunia2008Report.pdf, 2008.
-
(2008)
Secunia. 2008 Report
-
-
-
37
-
-
70449644479
-
Automatic reverse engineering of malware emulators
-
0
-
M. Sharif, A. Lanzi, J. Giffin, and W. Lee. Automatic reverse engineering of malware emulators. Security and Privacy, IEEE Symposium on, 0:94-109, 2009.
-
(2009)
Security and Privacy, IEEE Symposium on
, pp. 94-109
-
-
Sharif, M.1
Lanzi, A.2
Giffin, J.3
Lee, W.4
-
40
-
-
33745216482
-
The essence of command injection attacks in web applications
-
New York, NY, USA, ACM
-
Z. Su and G. Wassermann. The essence of command injection attacks in web applications. In POPL '06: Conference record of the 33rd ACM SIGPLAN-SIGACT symposium on Principles of programming languages, pages 372-382, New York, NY, USA, 2006. ACM.
-
(2006)
POPL '06: Conference Record of the 33rd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages
, pp. 372-382
-
-
Su, Z.1
Wassermann, G.2
-
41
-
-
84958963167
-
Accurate buffer overow detection via abstract pay load execution
-
Recent Advances in Intrusion Detection, Springer Berlin / Heidelberg
-
T. Toth and C. Kruegel. Accurate buffer overow detection via abstract pay load execution. In Recent Advances in Intrusion Detection, volume 2516 of Lecture Notes in Computer Science, pages 274-291. Springer Berlin / Heidelberg, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2516
, pp. 274-291
-
-
Toth, T.1
Kruegel, C.2
-
42
-
-
77954526946
-
-
W3Counter
-
W3Counter. Global web stats. 2009.
-
(2009)
Global Web Stats
-
-
-
43
-
-
77954608267
-
The multi-principal os construction of the gazelle web browser
-
H. J. Wang, C. Grier, A. Moshchuk, S. T. King, P. Choudhury, and H. Venter. The multi-principal os construction of the gazelle web browser. In Security '09: 19th USENIX Security Symposium, August 2009.
-
Security '09: 19th USENIX Security Symposium, August 2009
-
-
Wang, H.J.1
Grier, C.2
Moshchuk, A.3
King, S.T.4
Choudhury, P.5
Venter, H.6
-
44
-
-
21844456680
-
Shield: Vulnerability-driven network filters for preventing known vulnerability exploits
-
H. J. Wang, C. Guo, D. R. Simon, and A. Zugenmaier. Shield: vulnerability-driven network filters for preventing known vulnerability exploits. SIGCOMM Comput. Commun. Rev., 34(4):193-204, 2004.
-
(2004)
SIGCOMM Comput. Commun. Rev.
, vol.34
, Issue.4
, pp. 193-204
-
-
Wang, H.J.1
Guo, C.2
Simon, D.R.3
Zugenmaier, A.4
-
45
-
-
84904088330
-
Automated web patrol with strider honeymonkeys: Finding web sites that exploit browser vulnerabilities
-
Y.-M. Wang, D. Beck, X. Jiang, R. Roussev, C. Verbowski, S. Chen, and S. T. King. Automated web patrol with strider honeymonkeys: Finding web sites that exploit browser vulnerabilities. In Proceedings of the Network and Distributed System Security Symposium, NDSS 2006, San Diego, California, USA, 2006.
-
Proceedings of the Network and Distributed System Security Symposium, NDSS 2006, San Diego, California, USA, 2006
-
-
Wang, Y.-M.1
Beck, D.2
Jiang, X.3
Roussev, R.4
Verbowski, C.5
Chen, S.6
King, S.T.7
-
46
-
-
79960164190
-
Gatekeeper: Monitoring auto-start extensibility points (aseps) for spyware management
-
Berkeley, CA, USA, USENIX Association
-
Y.-M. Wang, R. Roussev, C. Verbowski, A. Johnson, M.-W. Wu, Y. Huang, and S.-Y. Kuo. Gatekeeper: Monitoring auto-start extensibility points (aseps) for spyware management. In LISA '04: Proceedings of the 18th USENIX conference on System administration, pages 33-46, Berkeley, CA, USA, 2004. USENIX Association.
-
(2004)
LISA '04: Proceedings of the 18th USENIX Conference on System Administration
, pp. 33-46
-
-
Wang, Y.-M.1
Roussev, R.2
Verbowski, C.3
Johnson, A.4
Wu, M.-W.5
Huang, Y.6
Kuo, S.-Y.7
-
48
-
-
69149106605
-
Native client: A sandbox for portable, untrusted x86 native code
-
B. Yee, D. Sehr, G. Dardyk, J. B. Chen, R. Muth, T. Ormandy, S. Okasaka, N. Narula, and N. Fullagar. Native client: A sandbox for portable, untrusted x86 native code. In Proceedings of the 30th IEEE Symposium on Security and Privacy, 2009.
-
Proceedings of the 30th IEEE Symposium on Security and Privacy, 2009
-
-
Yee, B.1
Sehr, D.2
Dardyk, G.3
Chen, J.B.4
Muth, R.5
Ormandy, T.6
Okasaka, S.7
Narula, N.8
Fullagar, N.9
-
49
-
-
77954521285
-
Studying malicious websites and the underground economyon the chinese web
-
Springer US
-
J. Zhuge, T. Holz, C. Song, J. Guo, X. Han, and W. Zou. Studying malicious websites and the underground economyon the chinese web. In Managing Information Risk and the Economics of Security, pages 1-20. Springer US, 2009.
-
(2009)
Managing Information Risk and the Economics of Security
, pp. 1-20
-
-
Zhuge, J.1
Holz, T.2
Song, C.3
Guo, J.4
Han, X.5
Zou, W.6
|