-
1
-
-
85077684219
-
-
Milw0rm. See http://www.milw0rm.com/.
-
Milw0rm
-
-
-
5
-
-
84882582017
-
An inside look at botnets
-
Springer Verlag
-
BARFORD, P., AND YEGNESWARAN, V. An inside look at botnets. In Advances in Information Security (2007), vol. 27, Springer Verlag, pp. 171–191.
-
(2007)
Advances in Information Security
, vol.27
, pp. 171-191
-
-
Barford, P.1
Yegneswaran, V.2
-
7
-
-
85077701966
-
Secunia’s wordpress GBK/Big5 character set
-
CHEUNG, A. Secunia’s wordpress GBK/Big5 character set”S” SQL injection advisory. See http://secunia.com/advisories/28005/.
-
S” SQL Injection Advisory
-
-
Cheung, A.1
-
9
-
-
78249251033
-
Protocol-independent adaptive replay of application dialog
-
February Internet Society
-
CUI, W., PAXSON, V., WEAVER, N., AND KATZ, R. H. Protocol-independent adaptive replay of application dialog. In Network and Distributed System Security Symposium 2006 (February 2006), Internet Society.
-
(2006)
Network and Distributed System Security Symposium 2006
-
-
Cui, W.1
Paxson, V.2
Weaver, N.3
Katz, R.H.4
-
10
-
-
48349110924
-
-
Tech. Rep. TR-06-004, International Computer Science Institute
-
CUI, W., PAXSON, V., AND WEAVER, N. C. GQ: Realizing a system to catch worms in a quarter million places. Tech. Rep. TR-06-004, International Computer Science Institute, 2006.
-
(2006)
GQ: Realizing a System to Catch Worms in a Quarter Million Places
-
-
Cui, W.1
Paxson, V.2
Weaver, N.C.3
-
11
-
-
84978401615
-
Revirt: Enabling intrusion analysis through virtual-machine logging and replay
-
New York, NY, USA, ACM Press
-
DUNLAP, G. W., KING, S. T., CINAR, S., BASRAI, M. A., AND CHEN, P. M. Revirt: enabling intrusion analysis through virtual-machine logging and replay. In Proceedings of the 5th symposium on Operating systems design and implementation (New York, NY, USA, 2002), ACM Press, pp. 211–224.
-
(2002)
Proceedings of the 5th Symposium on Operating Systems Design and Implementation
, pp. 211-224
-
-
Dunlap, G.W.1
King, S.T.2
Cinar, S.3
Basrai, M.A.4
Chen, P.M.5
-
13
-
-
85061529860
-
Bothunter: Detecting malware infection through IDS-driven dialog correlation
-
August
-
GU, G., PORRAS, P., YEGNESWARAN, V., FONG, M., AND LEE, W. BotHunter: Detecting malware infection through IDS-driven dialog correlation. In Proceedings of the 16th USENIX Security Symposium (August 2007), pp. 167–182.
-
(2007)
Proceedings of the 16th USENIX Security Symposium
, pp. 167-182
-
-
Gu, G.1
Porras, P.2
Yegneswaran, V.3
Fong, M.4
Lee, W.5
-
15
-
-
26844548971
-
-
Tech. rep., The March
-
Know your enemy: Tracking botnets. Tech. rep., The Honeynet Project and Research Alliance, March 2005. Available from http://www.honeynet.org/papers/bots/.
-
(2005)
Know Your Enemy: Tracking Botnets
-
-
-
17
-
-
33750320499
-
Automatic handling of protocol dependencies and reaction to 0-day attacks with ScriptGen based honeypots
-
D. Zamboni and C. Krügel, Eds., 4219 of Lecture Notes in Computer Science, Springer
-
LEITA, C., DACIER, M., AND MASSICOTTE, F. Automatic handling of protocol dependencies and reaction to 0-day attacks with ScriptGen based honeypots. In RAID(2006), D. Zamboni and C. Krügel, Eds., vol. 4219 of Lecture Notes in Computer Science, Springer, pp. 185–205.
-
(2006)
RAID
, pp. 185-205
-
-
Leita, C.1
Dacier, M.2
Massicotte, F.3
-
19
-
-
0014757386
-
A general method applicable to the search for similarities in the amino acid sequence of two proteins
-
NEEDLEMAN, S. B., AND WUNSCH, C. D. A general method applicable to the search for similarities in the amino acid sequence of two proteins. Journal of Molecular Biology, 48 (1970), 443–453.
-
(1970)
Journal of Molecular Biology
, vol.48
, pp. 443-453
-
-
Needleman, S.B.1
Wunsch, C.D.2
-
20
-
-
27544498978
-
PolyGraph: Automatically generating signatures for polymorphic worms
-
Washington, DC, USA, IEEE Computer Society
-
NEWSOME, J., KARP, B., AND SONG, D. Polygraph: Automatically generating signatures for polymorphic worms. In Proceedings of the 2005 IEEE Symposium on Security and Privacy (Washington, DC, USA, 2005), IEEE Computer Society, pp. 226–241.
-
(2005)
Proceedings of the 2005 IEEE Symposium on Security and Privacy
, pp. 226-241
-
-
Newsome, J.1
Karp, B.2
Song, D.3
-
21
-
-
79953672829
-
Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
-
NEWSOME, J., AND SONG, D. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In Proceedings of the Network and Distributed System Security Symposium (2005).
-
(2005)
Proceedings of the Network and Distributed System Security Symposium
-
-
Newsome, J.1
Song, D.2
-
22
-
-
74849104047
-
-
October
-
PANG, R., YEGNESWARAN, V., BARFORD, P., PAXSON, V., AND PETERSON, L. Characteristics of Internet background radiation, October 2004.
-
(2004)
Characteristics of Internet Background Radiation
-
-
Pang, R.1
Yegneswaran, V.2
Barford, P.3
Paxson, V.4
Peterson, L.5
-
24
-
-
34547181258
-
Search worms
-
New York, NY, USA, ACM
-
th ACM workshop on Recurring malcode (New York, NY, USA, 2006), ACM, pp. 1–8.
-
(2006)
th ACM Workshop on Recurring Malcode
, pp. 1-8
-
-
Provos, N.1
McClain, J.2
Wang, K.3
-
25
-
-
85080711655
-
The ghost in the browser: Analysis of web-based malware
-
PROVOS, N., MCNAMEE, D., MAVROMMATIS, P., WANG, K., AND MODADUGU, N. The ghost in the browser: Analysis of web-based malware. In Usenix Workshop on Hot Topics in Botnets (HotBots) (2007).
-
(2007)
Usenix Workshop on Hot Topics in Botnets (HotBots)
-
-
Provos, N.1
McNamee, D.2
Mavrommatis, P.3
Wang, K.4
Modadugu, N.5
-
26
-
-
34547399387
-
A multifaceted approach to understanding the botnet phenomenon
-
October ACM
-
RAJAB, M. A., ZARFOSS, J., MONROSE, F., AND TERZIS, A. A multifaceted approach to understanding the botnet phenomenon. In Proceedings of ACM SIGCOMM/USENIX Internet Measurement Conference (October 2006), ACM, pp. 41–52.
-
(2006)
Proceedings of ACM SIGCOMM/USENIX Internet Measurement Conference
, pp. 41-52
-
-
Rajab, M.A.1
Zarfoss, J.2
Monrose, F.3
Terzis, A.4
-
27
-
-
85000701895
-
My botnet is bigger than yours (maybe, better than yours): Why size estimates remain challenging
-
April
-
RAJAB, M. A., ZARFOSS, J., MONROSE, F., AND TERZIS, A. My botnet is bigger than yours (maybe, better than yours): Why size estimates remain challenging. In Proceedings of the first USENIX workshop on hot topics in Botnets (HotBots’07). (April 2007).
-
(2007)
Proceedings of the First USENIX Workshop on Hot Topics in Botnets (HotBots’07)
-
-
Rajab, M.A.1
Zarfoss, J.2
Monrose, F.3
Terzis, A.4
-
28
-
-
77952973248
-
-
February
-
RIDEN, J., MCGEEHAN, R., ENGERT, B., AND MUETER, M. Know your enemy: Web application threats, February 2007.
-
(2007)
Know Your Enemy: Web Application Threats
-
-
Riden, J.1
McGeehan, R.2
Engert, B.3
Mueter, M.4
-
29
-
-
35748971032
-
Estimating the selectivity of TF-IDF based cosine similarity predicates
-
June
-
TATA, S., AND PATEL, J. Estimating the selectivity of TF-IDF based cosine similarity predicates. SIGMOD Record 36, 2 (June 2007).
-
(2007)
SIGMOD Record 36
, pp. 2
-
-
Tata, S.1
Patel, J.2
-
30
-
-
0026187945
-
The zero-frequency problem: Estimating the probabilities of novel events in adaptive text compression
-
WITTEN, I. H., AND BELL, T. C. The zero-frequency problem: Estimating the probabilities of novel events in adaptive text compression. IEEE Transactions on Information Theory 37, 4 (1991), 1085–1094.
-
(1991)
IEEE Transactions on Information Theory
, vol.37
, Issue.4
, pp. 1085-1094
-
-
Witten, I.H.1
Bell, T.C.2
-
31
-
-
84923445084
-
An architecture for generating semantics-aware signatures
-
Baltimore, MD, USA, Aug
-
th USENIX Security Symposium (Baltimore, MD, USA, Aug. 2005), pp. 97–112.
-
(2005)
th USENIX Security Symposium
, pp. 97-112
-
-
Yegneswaran, V.1
Giffin, J.T.2
Barford, P.3
Jha, S.4
|