-
2
-
-
34548708575
-
Lurking in the shadows: Identifying systemic threats to kernel data (short paper)
-
DOI 10.1109/SP.2007.25, 4223229, Proceedings - S and P 2007: 2007 IEEE Symposium on Security and Privacy, SP'07
-
A. Baliga, P. Kamat, and L. Iftode, "Lurking in the Shadows: Identifying Systemic Threats to Kernel Data," Proc. IEEE Symp. Security and Privacy, pp. 246-251, 2007. (Pubitemid 47432531)
-
(2007)
Proceedings - IEEE Symposium on Security and Privacy
, pp. 246-251
-
-
Baliga, A.1
Kamat, P.2
Iftode, L.3
-
4
-
-
37849017546
-
Mining specifications of malicious behavior
-
M. Christodorescu, S. Jha, and C. Kruegel, "Mining Specifications of Malicious Behavior," Proc. Sixth Joint Meeting of the European Software Eng. Conf. and the ACM SIGSOFT Symp. the Foundations of Software Eng. (ESEC-FSE'07), pp. 5-14, 2007.
-
(2007)
Proc. Sixth Joint Meeting of the European Software Eng. Conf. and the ACM SIGSOFT Symp. The Foundations of Software Eng. (ESEC-FSE'07)
, pp. 5-14
-
-
Christodorescu, M.1
Jha, S.2
Kruegel, C.3
-
5
-
-
33846286141
-
Design and implementation of an extrusion-based break-in detector for personal computers
-
DOI 10.1109/CSAC.2005.19, 1565263, Proceedings - 21st Annual Computer Security Applications Conference, ACSAC 2005
-
W. Cui, R. H. Katz, and W. tian Tan, "Design and Implementation of an Extrusion-Based Break-in Detector for Personal Computers," Proc. 21st Ann. IEEE Computer Security Applications Conf. (ACSAC'05), pp. 361-370, 2005. (Pubitemid 46116492)
-
(2005)
Proceedings - Annual Computer Security Applications Conference, ACSAC
, vol.2005
, pp. 361-370
-
-
Cui, W.1
Katz, R.H.2
Tan, W.-T.3
-
6
-
-
0016949746
-
A lattice model of secure information flow
-
May
-
D. E. Denning, "A Lattice Model of Secure Information Flow," Comm. ACM, vol. 19, pp. 236-243, May 1976.
-
(1976)
Comm. ACM
, vol.19
, pp. 236-243
-
-
Denning, D.E.1
-
7
-
-
0017517624
-
Certification of programs for secure information flow
-
July
-
D. E. Denning and P. J. Denning, "Certification of Programs for Secure Information Flow," Comm. ACM, vol. 20, pp. 504-513, July 1977.
-
(1977)
Comm. ACM
, vol.20
, pp. 504-513
-
-
Denning, D.E.1
Denning, P.J.2
-
9
-
-
70349240080
-
Ether: Malware analysis via hardware virtualization extensions
-
A. Dinaburg, P. Royal, M. Sharif, and W. Lee, "Ether: Malware Analysis via Hardware Virtualization Extensions," Proc. 15th ACM Conf. Computer and Comm. Security (CCS'08), pp. 51-62, 2008.
-
(2008)
Proc. 15th ACM Conf. Computer and Comm. Security (CCS'08)
, pp. 51-62
-
-
Dinaburg, A.1
Royal, P.2
Sharif, M.3
Lee, W.4
-
10
-
-
57349173947
-
Trustworthy and personalized computing on public kiosks
-
S. Garriss, R. Cáceres, S. Berger, R. Sailer, L. van Doorn, and X. Zhang, "Trustworthy and Personalized Computing on Public Kiosks," Proc. Sixth Int'l Conf. Mobile Systems, Applications, and Services, pp. 199-210, 2008.
-
(2008)
Proc. Sixth Int'l Conf. Mobile Systems, Applications, and Services
, pp. 199-210
-
-
Garriss, S.1
Cáceres, R.2
Berger, S.3
Sailer, R.4
Van Doorn, L.5
Zhang, X.6
-
12
-
-
85093847546
-
Peer-to-peer botnets: Overview and case study
-
Apr.
-
J. B. Grizzard, V. Sharma, C. Nunnery, B. B. Kang, and D. Dagon, "Peer-to-Peer Botnets: Overview and Case Study," Proc. First USENIX Workshop Hot Topics in Understanding Botnets, Apr. 2007.
-
(2007)
Proc. First USENIX Workshop Hot Topics in Understanding Botnets
-
-
Grizzard, J.B.1
Sharma, V.2
Nunnery, C.3
Kang, B.B.4
Dagon, D.5
-
13
-
-
85075837457
-
Bot Miner: Clustering analysis of network traffic for protocol-and structure-independent botnet detection
-
G. Gu, R. Perdisci, J. Zhang, and W. Lee, "Bot Miner: Clustering Analysis of Network Traffic for Protocol-and Structure-Independent Botnet Detection," Proc. 17th USENIX Security Symp., 2008.
-
(2008)
Proc. 17th USENIX Security Symp.
-
-
Gu, G.1
Perdisci, R.2
Zhang, J.3
Lee, W.4
-
14
-
-
85076925998
-
Not-a-bot: Improving service availability in the face of botnet attacks
-
R. Gummadi, H. Balakrishnan, P. Maniatis, and S. Ratnasamy, "Not-a-Bot: Improving Service Availability in the Face of Botnet Attacks," Proc. Sixth USENIX Symp. Networked Systems Design and Implementation (NDSI'09), 2009.
-
(2009)
Proc. Sixth USENIX Symp. Networked Systems Design and Implementation (NDSI'09)
-
-
Gummadi, R.1
Balakrishnan, H.2
Maniatis, P.3
Ratnasamy, S.4
-
15
-
-
65249189218
-
Fools download where angels fear to tread
-
M. G. Jaatun, J. Jensen, H. Vegge, F. M. Halvorsen, and R. W. Nergârd, "Fools Download where Angels Fear to Tread," IEEE Security & Privacy, vol. 7, no. 2, pp. 83-86, 2009.
-
(2009)
IEEE Security & Privacy
, vol.7
, Issue.2
, pp. 83-86
-
-
Jaatun, M.G.1
Jensen, J.2
Vegge, H.3
Halvorsen, F.M.4
Nergârd, R.W.5
-
16
-
-
70349676196
-
Capturing information flow with concatenated dynamic taint analysis
-
H. C. Kim, A. D. Keromytis, M. Covington, and R. Sahita, "Capturing Information Flow with Concatenated Dynamic Taint Analysis," Proc. Int'l Conf. Availability, Reliability, and Security (ARES'09), pp. 355-362, 2009.
-
(2009)
Proc. Int'l Conf. Availability, Reliability, and Security (ARES'09)
, pp. 355-362
-
-
Kim, H.C.1
Keromytis, A.D.2
Covington, M.3
Sahita, R.4
-
18
-
-
78650002259
-
BLADE: An attackagnostic approach for preventing drive-by malware infections
-
L. Lu, V. Yegneswaran, P. Porras, and W. Lee, "BLADE: An Attackagnostic Approach for Preventing Drive-By Malware Infections," Proc. 17th ACM Conf. Computer and Comm. Security, 2010.
-
(2010)
Proc. 17th ACM Conf. Computer and Comm. Security
-
-
Lu, L.1
Yegneswaran, V.2
Porras, P.3
Lee, W.4
-
19
-
-
55149108173
-
Flicker: An execution infrastructure for TCB minimization
-
J. M. McCune, B. J. Parno, A. Perrig, M. K. Reiter, and H. Isozaki, "Flicker: An Execution Infrastructure for TCB Minimization," Proc. Third ACM SIGOPS/EuroSys European Conf. Computer Systems, pp. 315-328, 2008.
-
(2008)
Proc. Third ACM SIGOPS/EuroSys European Conf. Computer Systems
, pp. 315-328
-
-
McCune, J.M.1
Parno, B.J.2
Perrig, A.3
Reiter, M.K.4
Isozaki, H.5
-
20
-
-
85077302433
-
Bump in the ether: A framework for securing sensitive user input
-
General Track
-
J. M. McCune, A. Perrig, and M. K. Reiter, "Bump in the Ether: A Framework for Securing Sensitive User Input," Proc. USENIX Ann. Technical Conf., General Track, pp. 185-198, 2006.
-
(2006)
Proc. USENIX Ann. Technical Conf.
, pp. 185-198
-
-
McCune, J.M.1
Perrig, A.2
Reiter, M.K.3
-
23
-
-
85000701895
-
My botnet is bigger than yours (maybe, better than yours)
-
Apr.
-
M. Rajab, J. Zarfoss, F. Monrose, and A. Terzis, "My Botnet Is Bigger Than Yours (Maybe, Better Than Yours)," Proc. First USENIX Workshop Hot Topics in Understanding Botnets, Apr. 2007.
-
(2007)
Proc. First USENIX Workshop Hot Topics in Understanding Botnets
-
-
Rajab, M.1
Zarfoss, J.2
Monrose, F.3
Terzis, A.4
-
24
-
-
56549083677
-
-
R. Lippmann, E. Kirda, and A. Trachtenberg, eds., Springer
-
R. Riley, X. Jiang, and D. Xu, "Guest-Transparent Prevention of Kernel Rootkits with VMM-Based Memory Shadowing," R. Lippmann, E. Kirda, and A. Trachtenberg, eds., pp. 1-20, Springer, 2008.
-
(2008)
Guest-transparent Prevention of Kernel Rootkits with VMM-Based Memory Shadowing
, pp. 1-20
-
-
Riley, R.1
Jiang, X.2
Xu, D.3
-
27
-
-
84944486544
-
Prediction and entropy of printed english
-
C. Shannon, "Prediction and Entropy of Printed English," Bell System Technical J., vol. 30, no. 1, pp. 50-64, 1951.
-
(1951)
Bell System Technical J.
, vol.30
, Issue.1
, pp. 50-64
-
-
Shannon, C.1
-
30
-
-
56549109177
-
Tamper-resistant, application-aware blocking of malicious network connections
-
Springer-Verlag
-
A. Srivastava and J. Giffin, "Tamper-Resistant, Application-Aware Blocking of Malicious Network Connections," Proc. 11th Int'l Symp. Recent Advances in Intrusion Detection, pp. 39-58, Springer-Verlag, 2008.
-
(2008)
Proc. 11th Int'l Symp. Recent Advances in Intrusion Detection
, pp. 39-58
-
-
Srivastava, A.1
Giffin, J.2
-
32
-
-
56549113546
-
Countering persistent kernel rootkits through systematic hook discovery
-
Springer-Verlag
-
Z. Wang, X. Jiang, W. Cui, and X. Wang, "Countering Persistent Kernel Rootkits through Systematic Hook Discovery," Proc. 11th Int'l Symp. Recent Advances in Intrusion Detection, pp. 21-38, Springer-Verlag, 2008.
-
(2008)
Proc. 11th Int'l Symp. Recent Advances in Intrusion Detection
, pp. 21-38
-
-
Wang, Z.1
Jiang, X.2
Cui, W.3
Wang, X.4
-
33
-
-
60649107135
-
Soft-timer driven transient kernel control flow attacks and defense
-
J. Wei, B. D. Payne, J. Giffin, and C. Pu, "Soft-Timer Driven Transient Kernel Control Flow Attacks and Defense," Proc. Ann. Computer Security Applications Conf., pp. 97-107, 2008.
-
(2008)
Proc. Ann. Computer Security Applications Conf.
, pp. 97-107
-
-
Wei, J.1
Payne, B.D.2
Giffin, J.3
Pu, C.4
-
34
-
-
76549113940
-
User-assisted host-based detection of outbound malware traffic
-
Dec.
-
H. Xiong, P. Malhotra, D. Stefan, C. Wu, and D. Yao, "User-Assisted Host-Based Detection of Outbound Malware Traffic," Proc. Int'l Conf. Information and Comm. Security (ICICS'09), Dec. 2009.
-
(2009)
Proc. Int'l Conf. Information and Comm. Security (ICICS'09)
-
-
Xiong, H.1
Malhotra, P.2
Stefan, D.3
Wu, C.4
Yao, D.5
-
35
-
-
38949139795
-
Satem: Trusted service code execution across transactions
-
G. Xu, C. Borcea, and L. Iftode, "Satem: Trusted Service Code Execution Across Transactions," Proc. 25th IEEE Symp. Reliable Distributed Systems (SRDS'06), pp. 321-336, 2006.
-
(2006)
Proc. 25th IEEE Symp. Reliable Distributed Systems (SRDS'06)
, pp. 321-336
-
-
Xu, G.1
Borcea, C.2
Iftode, L.3
-
36
-
-
81055138290
-
Detecting infection onset with behavior-based policies
-
Sept.
-
K. Xu, D. Yao, Q. Ma, and A. Crowell, "Detecting Infection Onset with Behavior-Based Policies," Proc. Fifth Int'l Conf. Network and System Security (NSS'11), Sept. 2011.
-
(2011)
Proc. Fifth Int'l Conf. Network and System Security (NSS'11)
-
-
Xu, K.1
Yao, D.2
Ma, Q.3
Crowell, A.4
-
37
-
-
77950788046
-
Panorama: Capturing systemwide information flow for malware detection and analysis
-
H. Yin, D. Song, M. Egele, C. Kruegel, and E. Kirda, "Panorama: Capturing Systemwide Information Flow for Malware Detection and Analysis," Proc. 14th ACM Conf. Computer and Communication Security (CCS'07), 2007.
-
(2007)
Proc. 14th ACM Conf. Computer and Communication Security (CCS'07)
-
-
Yin, H.1
Song, D.2
Egele, M.3
Kruegel, C.4
Kirda, E.5
|