-
1
-
-
33646767376
-
Control-flow integrity: Principles, implementations, and applications
-
Abadi, M., Budiu, M., Erlingsson, U., & Ligatti, J. (2005). Control-flow integrity: principles, implementations, and applications. In Proceedings of the ACM conference on computer and communications security (CCS).
-
(2005)
Proceedings of the ACM Conference on Computer and Communications Security (CCS)
-
-
Abadi, M.1
Budiu, M.2
Erlingsson, U.3
Ligatti, J.4
-
2
-
-
0006100649
-
Smashing the stack for fun and profit
-
AlephOne
-
AlephOne (2001). Smashing the stack for fun and profit. Phrack, 7(49-14).
-
(2001)
Phrack
, vol.7
, pp. 49-14
-
-
-
3
-
-
59249106693
-
Detecting targeted attacks using shadow honeypots
-
Anagnostakis, K. G., Sidiroglou, S., Akritidis, P., Xinidis, K., Markatos, E., & Keromytis, A. D. (2005). Detecting targeted attacks using shadow honeypots. In Proceedings of the 14th USENIX security symposium.
-
(2005)
Proceedings of the 14th USENIX Security Symposium
-
-
Anagnostakis, K.G.1
Sidiroglou, S.2
Akritidis, P.3
Xinidis, K.4
Markatos, E.5
Keromytis, A.D.6
-
4
-
-
78049527986
-
-
Tapion polymorphic engine
-
Bania, P. (2009). Tapion polymorphic engine. http://pb.specialised.info/ all/tapion/.
-
(2009)
-
-
Bania, P.1
-
6
-
-
18744376889
-
Randomized instruction set emulation to distrupt binary code injection attacks
-
Barrantes, E. G., Ackley, D. H., Forrest, S., Palmer, T. S., Stefanovic, D., & Zovi, D. D. (2003). Randomized instruction set emulation to distrupt binary code injection attacks. In Proceedings of the 10th ACM conference on computer and communications security (CCS).
-
(2003)
Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS)
-
-
Barrantes, E.G.1
Ackley, D.H.2
Forrest, S.3
Palmer, T.S.4
Stefanovic, D.5
Zovi, D.D.6
-
8
-
-
78049529713
-
-
Shellforge project
-
Biondi, P. (2006). Shellforge project. http://www.secdev.org/projects/ shellforge/.
-
(2006)
Biondi P.
-
-
-
9
-
-
33751056900
-
Towards automatic generation of vulnerability-based signatures
-
Brumley, D., Newsome, J., Song, D., Wang, H., & Jha, S. (2006). Towards automatic generation of vulnerability-based signatures. In Proceedings of the IEEE symposium on security and privacy.
-
(2006)
Proceedings of the IEEE Symposium on Security and Privacy
-
-
Brumley, D.1
Newsome, J.2
Song, D.3
Wang, H.4
Jha, S.5
-
10
-
-
78049528691
-
-
CERT Code red I/II worm.
-
CERT (2001). Code red I/II worm. http://www.cert.org/advisories/CA-2001- 19.html.
-
(2001)
-
-
-
12
-
-
84885679117
-
Vigilante: End-to-end containment of Internet worms
-
Costa, M., Crowcroft, J., Castro, M., & Rowstron, A. (2005). Vigilante: end-to-end containment of Internet worms. In Proceedings of the symposium on systems and operating systems principles (SOSP).
-
(2005)
Proceedings of the Symposium on Systems and Operating Systems Principles (SOSP)
-
-
Costa, M.1
Crowcroft, J.2
Castro, M.3
Rowstron, A.4
-
13
-
-
85084160243
-
Stackguard: Automatic adaptive detection and prevention of buffer-overflow attacks
-
Cowan, C., Pu, C., Maier, D., Hinton, H., Walpole, J., Bakke, P., Beattie, S., Grier, A., Wagle, P., & Zhang, Q. (1998). Stackguard: automatic adaptive detection and prevention of buffer-overflow attacks. In Proceedings of the USENIX security symposium.
-
(1998)
Proceedings of the USENIX Security Symposium
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Hinton, H.4
Walpole, J.5
Bakke, P.6
Beattie, S.7
Grier, A.8
Wagle, P.9
Zhang, Q.10
-
14
-
-
33745788387
-
On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits
-
Crandall, J. R., Su, Z., Wu, S. F., & Chong, F. T. (2005a). On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits. In Proceedings of the 12th ACM conference on computer and communications security (CCS).
-
(2005)
Proceedings of the 12th ACM Conference on Computer and Communications Security (CCS)
-
-
Crandall, J.R.1
Su, Z.2
Wu, S.F.3
Chong, F.T.4
-
16
-
-
34548717095
-
ShieldGen: Automated data patch generation for unknown vulnerabilities with informed probing
-
Cui, W., Peinado, M., Wang, H. J., & Locasto, M. E. (2007). ShieldGen: automated data patch generation for unknown vulnerabilities with informed probing. In Proceedings of the IEEE symposium on security and privacy.
-
(2007)
Proceedings of the IEEE Symposium on Security and Privacy
-
-
Cui, W.1
Peinado, M.2
Wang, H.J.3
Locasto, M.E.4
-
17
-
-
33644565261
-
Polymorphic shellcode engine using spectrum analysis
-
Detristan, T., Ulenspiegel, T., Malcom, Y., & von Underduk, M. S. (2003). Polymorphic shellcode engine using spectrum analysis. Phrack, 11(61-9).
-
(2003)
Phrack
, vol.11
, pp. 61-9
-
-
Detristan, T.1
Ulenspiegel, T.2
Malcom, Y.3
Von Underduk, M.S.4
-
20
-
-
85077703150
-
Polymorphic blending attacks
-
Fogla, P., Sharif, M., Perdisci, R., Kolesnikov, O., & Lee, W. (2006). Polymorphic blending attacks. In Proceedings of the USENIX security conference.
-
(2006)
Proceedings of the USENIX Security Conference
-
-
Fogla, P.1
Sharif, M.2
Perdisci, R.3
Kolesnikov, O.4
Lee, W.5
-
21
-
-
85013813547
-
Buffer overflow attacks: Detect, exploit, prevent
-
Foster, J. C., Osipov, V., Bhalla, N., & Heinen, N. (2005). Buffer overflow attacks: detect, exploit, prevent. Syngress.
-
(2005)
Syngress
-
-
Foster, J.C.1
Osipov, V.2
Bhalla, N.3
Heinen, N.4
-
22
-
-
84885639914
-
Detecting past and present intrusions through vulnerability-specific predicates
-
Joshi, A., King, S. T., Dunlap, G. W., & Chen, P. M. (2005). Detecting past and present intrusions through vulnerability-specific predicates. In Proceedings of the symposium on systems and operating systems principles (SOSP).
-
(2005)
Proceedings of the Symposium on Systems and Operating Systems Principles (SOSP)
-
-
Joshi, A.1
King, S.T.2
Dunlap, G.W.3
Chen, P.M.4
-
23
-
-
78049529851
-
-
K2 ADMmutate documentation
-
K2 (2003). ADMmutate documentation. http://www.ktwo.ca/ADMmutate-0.8.4. tar.gz.
-
(2003)
-
-
-
29
-
-
33746389292
-
Polymorphic worm detection using structural information of executables
-
Krugel, C., Kirda, E., Mutz, D., Robertson, W., & Vigna, G. (2005). Polymorphic worm detection using structural information of executables. In Proceedings of the 8th international symposium on recent advances in intrusion detection (RAID) (pp. 207-226).
-
(2005)
Proceedings of the 8th International Symposium on Recent Advances in Intrusion Detection (RAID)
, pp. 207-226
-
-
Krugel, C.1
Kirda, E.2
Mutz, D.3
Robertson, W.4
Vigna, G.5
-
31
-
-
33745652318
-
FLIPS: Hybrid adaptive intrusion prevention
-
Locasto, M. E., Wang, K., Keromytis, A. D., & Stolfo, S. J. (2005). FLIPS: hybrid adaptive intrusion prevention. In Proceedings of the 8th international symposium on recent advances in intrusion detection (RAID) (pp. 82-101).
-
(2005)
Proceedings of the 8th International Symposium on Recent Advances in Intrusion Detection (RAID)
, pp. 82-101
-
-
Locasto, M.E.1
Wang, K.2
Keromytis, A.D.3
Stolfo, S.J.4
-
32
-
-
78049528890
-
-
Metasploit Development Team Metasploit project
-
Metasploit Development Team (2006). Metasploit project. http://www.metasploit.com.
-
(2006)
-
-
-
36
-
-
77952338015
-
Building IA32 'Unicode-Proof' shellcodes
-
Obscou
-
Obscou (2003). Building IA32 'Unicode-Proof' shellcodes. Phrack, 11(61-11).
-
(2003)
Phrack
, vol.11
, pp. 61-11
-
-
-
37
-
-
78049527896
-
-
Panda Labs MPack uncovered
-
Panda Labs (2007). MPack uncovered. http://pandalabs.pandasecurity.com/.
-
(2007)
-
-
-
39
-
-
77952348035
-
Writing IA-32 alphanumeric shellcodes
-
Rix
-
Rix (2001). Writing IA-32 alphanumeric shellcodes. Phrack, 11(57-15).
-
(2001)
Phrack
, vol.11
, pp. 57-15
-
-
-
41
-
-
78049527133
-
-
SANS IISMedia Exploit
-
SANS (2004a). IISMedia Exploit. http://www.sans.org/newsletters/cva/vol2- 21.php.
-
(2004)
-
-
-
42
-
-
78049529201
-
-
SANS Santy worm
-
SANS (2004b). Santy worm. http://isc.sans.org/diary.html?date=2004-12-21.
-
(2004)
-
-
-
43
-
-
78049527303
-
-
SANS Webdav exploit
-
SANS (2004c). Webdav exploit. http://www.sans.org/resources/malwarefaq/ webdav-exploit.php.
-
(2004)
-
-
-
44
-
-
78049527803
-
-
Evading NIDS
-
Siddharth, S. (2005). Evading NIDS. http://www.securityfocus.com/infocus/ 1852.
-
(2005)
-
-
Siddharth, S.1
-
46
-
-
84991765629
-
Automated worm fingerprinting
-
Singh, S., Estan, C., Varghese, G., & Savage, S. (2004). Automated worm fingerprinting. In Proceedings of symposium on operating systems design and implementation (OSDI).
-
(2004)
Proceedings of Symposium on Operating Systems Design and Implementation (OSDI)
-
-
Singh, S.1
Estan, C.2
Varghese, G.3
Savage, S.4
-
47
-
-
78049530482
-
-
Snort Development Team Snort project
-
Snort Development Team (2009). Snort project. http://www.snort.org/.
-
(2009)
-
-
-
48
-
-
41549098765
-
On the infeasibility of modeling polymorphic shellcode
-
Song, Y., Locasto, M. E., Stavrou, A., Keromytis, A. D., & Stolfo, S. J. (2007). On the infeasibility of modeling polymorphic shellcode. In Proceedings of the ACM conference on computer and communications security (CCS).
-
(2007)
Proceedings of the ACM Conference on Computer and Communications Security (CCS)
-
-
Song, Y.1
Locasto, M.E.2
Stavrou, A.3
Keromytis, A.D.4
Stolfo, S.J.5
-
49
-
-
0037269111
-
Reliable identification of bounded-length viruses is NP-complete
-
10.1109/TIT.2002.806137 1966706 1063.68045
-
D. Spinellis 2003 Reliable identification of bounded-length viruses is NP-complete IEEE Transactions on Information Theory 49 1 280 284 10.1109/TIT.2002.806137 1966706 1063.68045
-
(2003)
IEEE Transactions on Information Theory
, vol.49
, Issue.1
, pp. 280-284
-
-
Spinellis, D.1
-
50
-
-
78049527932
-
-
Tcpdump
-
Tcpdump (2009). http://www.tcpdump.org.
-
(2009)
-
-
-
53
-
-
21844456680
-
Shield: Vulnerability-driven network filters for preventing known vulnerability exploits
-
Wang, H. J., Guo, C., Simon, D. R., & Zugenmaier, A. (2004). Shield: vulnerability-driven network filters for preventing known vulnerability exploits. In Proceedings of the ACM SIGCOMM conference (pp. 193-204).
-
(2004)
Proceedings of the ACM SIGCOMM Conference
, pp. 193-204
-
-
Wang, H.J.1
Guo, C.2
Simon, D.R.3
Zugenmaier, A.4
-
56
-
-
85027555608
-
SigFree: A signature-free buffer overflow attack blocker
-
Wang, X., Pan, C. C., Liu, P., & Zhu, S. (2006b). SigFree: a signature-free buffer overflow attack blocker. In Proceedings of the 15th USENIX security symposium (pp. 225-240).
-
(2006)
Proceedings of the 15th USENIX Security Symposium
, pp. 225-240
-
-
Wang, X.1
Pan, C.C.2
Liu, P.3
Zhu, S.4
-
57
-
-
84923445084
-
An architecture for generating semantics-aware signatures
-
Yegneswaran, V., Giffin, J. T., Barford, P., & Jha, S. (2005). An architecture for generating semantics-aware signatures. In Proceedings of the 14th USENIX security symposium.
-
(2005)
Proceedings of the 14th USENIX Security Symposium
-
-
Yegneswaran, V.1
Giffin, J.T.2
Barford, P.3
Jha, S.4
|