-
1
-
-
77956600078
-
-
Bitdefender malware and spam survey. http://news.bitdefender.com/NW1094- en-BitDefender-Malware-and-Spam-Survey-finds-E-Threats-Adapting-to-Online- Behavioral-Trends.html.
-
Bitdefender Malware and Spam Survey
-
-
-
5
-
-
77956594848
-
-
visited in Nov.
-
Virus collection (vx heavens). http://vx.netlux.org/vl.php, visited in Nov. 2009.
-
(2009)
Virus Collection (vx heavens)
-
-
-
6
-
-
40749132125
-
Parasitic malware: The resurgence of an old threat
-
Parasitic malware: The resurgence of an old threat. Network Security, 2008(3): 15 - 18, 2008.
-
(2008)
Network Security
, vol.2008
, Issue.3
, pp. 15-18
-
-
-
8
-
-
0031635934
-
Garbage collection and local variable type-precision and liveness in java virtual machines
-
O. Agesen, D. Detlefs, and J. E. Moss. Garbage collection and local variable type-precision and liveness in java virtual machines. SIG-PLAN Not., 33(5):269-279, 1998.
-
(1998)
SIG-PLAN Not
, vol.33
, Issue.5
, pp. 269-279
-
-
Agesen, O.1
Detlefs, D.2
Moss, J.E.3
-
9
-
-
77956587807
-
Space efficient conservative garbage collection
-
H.-J. Boehm. Space efficient conservative garbage collection. In ACM PLDI'93, 1993.
-
(1993)
ACM PLDI'93
-
-
Boehm, H.-J.1
-
10
-
-
70349267779
-
When good instructions go bad: Generalizing return-oriented programming to RISC
-
E. Buchanan, R. Roemer, H. Shacham, and S. Savage. When good instructions go bad: Generalizing return-oriented programming to RISC. In ACM CCS'08, 2008.
-
(2008)
ACM CCS'08
-
-
Buchanan, E.1
Roemer, R.2
Shacham, H.3
Savage, S.4
-
11
-
-
83455215100
-
Binary code extraction and interface identification for security applications
-
J. Caballero, N. M. Johnson, S. McCamant, and D. Song. Binary code extraction and interface identification for security applications. In ISOC NDSS'10, 2010.
-
(2010)
ISOC NDSS'10
-
-
Caballero, J.1
Johnson, N.M.2
McCamant, S.3
Song, D.4
-
13
-
-
85084160792
-
Understanding data lifetime via whole system simulation
-
J. Chow, B. Pfaff, T. Garfinkel, K. Christopher, and M. Rosenblum. Understanding data lifetime via whole system simulation. In 13th USENIX Security Symposium, 2004.
-
(2004)
13th USENIX Security Symposium
-
-
Chow, J.1
Pfaff, B.2
Garfinkel, T.3
Christopher, K.4
Rosenblum, M.5
-
15
-
-
77956583022
-
"Retum-to-libc" attack
-
August
-
S. Designer. "retum-to-libc" attack. Bugtraq, August 1997.
-
(1997)
Bugtraq
-
-
Designer, S.1
-
16
-
-
70349100099
-
Anomaly detection using call stack information
-
H. H. Feng, O. M. Kolesnikov, P. Fogla, W. Lee, and W. Gong. Anomaly detection using call stack information. In IEEE Symposium on Security and Privacy, 2003.
-
(2003)
IEEE Symposium on Security and Privacy
-
-
Feng, H.H.1
Kolesnikov, O.M.2
Fogla, P.3
Lee, W.4
Gong, W.5
-
18
-
-
0032313923
-
Intrusion detection using sequences of system calls
-
S. A. Hofmeyr, S. Forrest, and A. Somayaji. Intrusion detection using sequences of system calls. J. Computer Security, 6(3):151-180, 1998.
-
(1998)
J. Computer Security
, vol.6
, Issue.3
, pp. 151-180
-
-
Hofmeyr, S.A.1
Forrest, S.2
Somayaji, A.3
-
19
-
-
60049091978
-
Randomized instruction sets and runtime environments past research and future directions
-
A. D. Keromytis. Randomized instruction sets and runtime environments past research and future directions. IEEE Security and Privacy, 7(1):18-25, 2009.
-
(2009)
IEEE Security and Privacy
, vol.7
, Issue.1
, pp. 18-25
-
-
Keromytis, A.D.1
-
20
-
-
84988573115
-
The design and implementation of tripwire: A file system integrity checker
-
G. H. Kim and E. H. Spafford. The design and implementation of tripwire: a file system integrity checker. In ACM CCS'94, 1994.
-
(1994)
ACM CCS'94
-
-
Kim, G.H.1
Spafford, E.H.2
-
22
-
-
77956605043
-
Reuse-oriented camouflaging attack: Vulnerability detection and attack construction
-
Z. Lin, X. Zhang, and D. Xu. Reuse-Oriented Camouflaging Attack: Vulnerability Detection and Attack Construction. Technical report, CERIAS TR 2009-29, Purdue University, 2009.
-
(2009)
Technical Report, CERIAS TR 2009-29, Purdue University
-
-
Lin, Z.1
Zhang, X.2
Xu, D.3
-
23
-
-
3042642332
-
The advanced return-into-lib(c) exploits: Pax case study
-
Nergal. The advanced return-into-lib(c) exploits: Pax case study. Phrack, 10(58), 2001.
-
(2001)
Phrack
, vol.10
, Issue.58
-
-
Nergal1
-
24
-
-
35448955692
-
Valgrind: A framework for heavyweight dynamic binary instrumentation
-
N. Nethercote and J. Seward. Valgrind: A framework for heavyweight dynamic binary instrumentation. In ACMPLDI'07, 2007.
-
(2007)
ACMPLDI'07
-
-
Nethercote, N.1
Seward, J.2
-
25
-
-
27544444280
-
Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
-
J. Newsome and D. Song. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In ISOC NDSS'05, 2005.
-
(2005)
ISOC NDSS'05
-
-
Newsome, J.1
Song, D.2
-
27
-
-
77952351839
-
The geometry of innocent flesh on the bone: Return-into-libc without function calls
-
H. Shacham. The geometry of innocent flesh on the bone: return-into-libc without function calls. In ACM CCS'07, 2007.
-
(2007)
ACM CCS'07
-
-
Shacham, H.1
-
29
-
-
0034301988
-
Quantifying the closeness between program components and features
-
W. E. Wong, S. S. Gokhale, and J. R. Horgan. Quantifying the closeness between program components and features. J. Syst. Softw., 54(2):87-98, 2000.
-
(2000)
J. Syst. Softw.
, vol.54
, Issue.2
, pp. 87-98
-
-
Wong, W.E.1
Gokhale, S.S.2
Horgan, J.R.3
-
30
-
-
77950788046
-
Panorama: Capturing system-wide information flow for malware detection and analysis
-
H. Yin, D. Song, E. Manuel, C. Kruegel, and E. Kirda. Panorama: Capturing system-wide information flow for malware detection and analysis. In ACM CCS'07, 2007.
-
(2007)
ACM CCS'07
-
-
Yin, H.1
Song, D.2
Manuel, E.3
Kruegel, C.4
Kirda, E.5
|