-
1
-
-
74049095923
-
Dispatcher: Enabling active botnet infiltration using automatic protocol reverse-engineering
-
J. Caballero, P. Poosankam, C. Kreibich, and D. Song. Dispatcher: Enabling active botnet infiltration using automatic protocol reverse-engineering. In ACM Proc. CCS, pages 621-634, 2009.
-
(2009)
ACM Proc. CCS
, pp. 621-634
-
-
Caballero, J.1
Poosankam, P.2
Kreibich, C.3
Song, D.4
-
2
-
-
77952403312
-
Polyglot: Automatic extraction of protocol message format using dynamic binary analysis
-
J. Caballero, H. Yin, Z. Liang, and D. Song. Polyglot: Automatic extraction of protocol message format using dynamic binary analysis. In ACM Proc. CCS, pages 317-329, 2007.
-
(2007)
ACM Proc. CCS
, pp. 317-329
-
-
Caballero, J.1
Yin, H.2
Liang, Z.3
Song, D.4
-
3
-
-
84953724298
-
-
Computer Crime and Intellectual Property Section, U.S. Department of Justice, August
-
Computer Crime and Intellectual Property Section, U.S. Department of Justice. Retention Periods of Major Cellular Service Providers. http://dgsearch.no-ip. biz/rnrfiles/retention.pdf, August 2010.
-
(2010)
Retention Periods of Major Cellular Service Providers
-
-
-
4
-
-
76749136584
-
Digging for data structures
-
Dec
-
A. Cozzie, F. Stratton, H. Xue, and S. T. King. Digging For Data Structures. In Proc. USENIX OSDI Symposium, pages 255-266, Dec 2008.
-
(2008)
Proc. USENIX OSDI Symposium
, pp. 255-266
-
-
Cozzie, A.1
Stratton, F.2
Xue, H.3
King, S.T.4
-
5
-
-
84893143817
-
Discoverer: Automatic protocol reverse engineering from network traces
-
W. Cui, J. Kannan, and H. J. Wang. Discoverer: Automatic protocol reverse engineering from network traces. In USENIX Security Symp, pages 1-14, 2007.
-
(2007)
USENIX Security Symp
, pp. 1-14
-
-
Cui, W.1
Kannan, J.2
Wang, H.J.3
-
6
-
-
70349283250
-
Tupni: Automatic reverse engineering of input formats
-
W. Cui, M. Peinado, K. Chen, H. J.Wang, and L. Irun-Briz. Tupni: Automatic reverse engineering of input formats. In Proc. ACM CCS, pages 391-402, 2008.
-
(2008)
Proc. ACM CCS
, pp. 391-402
-
-
Cui, W.1
Peinado, M.2
Chen, K.3
Wang, H.J.4
Irun-Briz, L.5
-
7
-
-
57149123931
-
LearnPADS: Automatic tool generation from ad hoc data
-
K. Fisher, D. Walker, and K. Q. Zhu. LearnPADS: Automatic tool generation from ad hoc data. In Proc. ACM SIGMOD, pages 1299-1302, 2008.
-
(2008)
Proc. ACM SIGMOD
, pp. 1299-1302
-
-
Fisher, K.1
Walker, D.2
Zhu, K.Q.3
-
8
-
-
67650156091
-
From dirt to shovels: Fully automatic tool generation from ad hoc data
-
K. Fisher, D. Walker, K. Q. Zhu, and P. White. From dirt to shovels: Fully automatic tool generation from ad hoc data. In Proc. ACM POPL, pages 421-434, 2008.
-
(2008)
Proc. ACM POPL
, pp. 421-434
-
-
Fisher, K.1
Walker, D.2
Zhu, K.Q.3
White, P.4
-
9
-
-
77955404469
-
Using purpose-built functions and block hashes to enable small block and sub-file forensics
-
Aug
-
S. Garfinkel, A. Nelson, D. White, and V. Roussev. Using purpose-built functions and block hashes to enable small block and sub-file forensics. In Proc. DFRWS Annual Forensics Research Conference, pages 13-23, Aug 2010.
-
(2010)
Proc. DFRWS Annual Forensics Research Conference
, pp. 13-23
-
-
Garfinkel, S.1
Nelson, A.2
White, D.3
Roussev, V.4
-
10
-
-
0003620778
-
-
Addison-Wesley
-
J. E. Hopcroft, R. Motwani, and J. D. Ullman. Introduction to Automata Theory, Languages, and Computation. Addison-Wesley, 2000.
-
(2000)
Introduction to Automata Theory, Languages, and Computation
-
-
Hopcroft, J.E.1
Motwani, R.2
Ullman, J.D.3
-
11
-
-
77952112123
-
The forensic use of mobile phone flasher boxes
-
May
-
K. Jonkers. The forensic use of mobile phone flasher boxes. Digital Investigation, 6(3-4):168-178, May 2010.
-
(2010)
Digital Investigation
, vol.6
, Issue.3-4
, pp. 168-178
-
-
Jonkers, K.1
-
13
-
-
0022030599
-
Efficient randomized patternmatching algorithms
-
March
-
R. Karp and M. Rabin. Efficient randomized patternmatching algorithms. IBM J. Res. Dev., 31(2):249-260, March 1987.
-
(1987)
IBM J. Res. Dev.
, vol.31
, Issue.2
, pp. 249-260
-
-
Karp, R.1
Rabin, M.2
-
14
-
-
34249334041
-
Inference of letter-phoneme correspondences by delimiting and dynamic time warping techniques
-
Mar.
-
R. Luk and R. Damper. Inference of letter-phoneme correspondences by delimiting and dynamic time warping techniques. In IEEE Intl Conf on Acoustics, Speech, and Signal Processing, volume 2, pages 61-64, Mar. 1992.
-
(1992)
IEEE Intl Conf on Acoustics, Speech, and Signal Processing
, vol.2
, pp. 61-64
-
-
Luk, R.1
Damper, R.2
-
15
-
-
85076470547
-
-
R. C. C. Milanesi, T. H. Nguyen, C. Lu, A. Zimmermann, A. Sato, H. D. L. Vergne, and A. Gupta. Market Share Analysis: Mobile Devices, Worldwide, 4Q10 and 2010. http://www.gartner.com/ DisplayDocument?id=1542114; see also http: //tinyurl.com/4zandx4, Feb 2011.
-
(2011)
Market Share Analysis: Mobile Devices, Worldwide, 4Q10 and 2010, Feb
-
-
Milanesi, R.C.C.1
Nguyen, T.H.2
Lu, C.3
Zimmermann, A.4
Sato, A.5
Vergne, H.D.L.6
Gupta, A.7
-
16
-
-
77952101825
-
The growing need for on-scene triage of mobile devices
-
R. P. Mislan, E. Casey, and G. C. Kessler. The growing need for on-scene triage of mobile devices. Digital Investigation, 6(3-4):112-124, 2010.
-
(2010)
Digital Investigation
, vol.6
, Issue.3-4
, pp. 112-124
-
-
Mislan, R.P.1
Casey, E.2
Kessler, G.C.3
-
17
-
-
17844382217
-
-
National Gang Intelligence Center, Technical Report Document ID: 2009-M0335-001, US Dept. of Justice, Jan
-
National Gang Intelligence Center. National Gang Threat Assessment 2009. Technical Report Document ID: 2009-M0335-001, US Dept. of Justice, http://www.usdoj. gov/ndic/pubs32/32146, Jan 2009.
-
(2009)
National Gang Threat Assessment 2009
-
-
-
18
-
-
85032750978
-
The evolution of file carving
-
March
-
A. Pal and N. Memon. The evolution of file carving. Signal Processing Magazine, IEEE, 26(2):59 -71, March 2009.
-
(2009)
Signal Processing Magazine, IEEE
, vol.26
, Issue.2
, pp. 59-71
-
-
Pal, A.1
Memon, N.2
-
19
-
-
48749129422
-
Detecting file fragmentation point using sequential hypothesis testing
-
A. Pal, H. T. Sencar, and N. Memon. Detecting file fragmentation point using sequential hypothesis testing. Digital Investigation, 5(S1):2-13, 2008.
-
(2008)
Digital Investigation
, vol.5
, Issue.S1
, pp. 2-13
-
-
Pal, A.1
Sencar, H.T.2
Memon, N.3
-
24
-
-
84935113569
-
Error bounds for convolutional codes and an asymptotically optimum decoding algorithm
-
April
-
A. Viterbi. Error bounds for convolutional codes and an asymptotically optimum decoding algorithm. IEEE Transactions on Information Theory, 13(2):260-269, April 1967.
-
(1967)
IEEE Transactions on Information Theory
, vol.13
, Issue.2
, pp. 260-269
-
-
Viterbi, A.1
-
25
-
-
70350686658
-
Ad hoc data and the token ambiguity problem
-
Q. Xi, K. Fisher, D. Walker, and K. Zhu. Ad hoc data and the token ambiguity problem. In Proc. Intl Symp Practical Aspects of Declarative Languages, pages 91-106, 2009.
-
(2009)
Proc. Intl Symp Practical Aspects of Declarative Languages
, pp. 91-106
-
-
Xi, Q.1
Fisher, K.2
Walker, D.3
Zhu, K.4
|