-
3
-
-
51949119334
-
Botnet Detection and Response: The Network Is the Infection
-
Analysis, and Research Center Workshop, July
-
Dagon, D.: Botnet Detection and Response: The Network Is the Infection. In Operations, Analysis, and Research Center Workshop, July 2005.
-
(2005)
Operations
-
-
Dagon, D.1
-
4
-
-
84882781985
-
Most spam generated by botnets, says expert
-
Sept
-
Ilett, D.: Most spam generated by botnets, says expert. ZDNet, Sept. 22, 2004.
-
(2004)
ZDNet
, pp. 22
-
-
Ilett, D.1
-
6
-
-
84888402098
-
The Zombie Roundup: Understanding, Detecting, and Disrupting Botnets
-
Cooke, E., Jahanian, F., McPherson, D.: The Zombie Roundup: Understanding, Detecting, and Disrupting Botnets. In Steps to Reducing Unwanted Traffic on the Internet, July 2005.
-
(2005)
Steps to Reducing Unwanted Traffic On the Internet
-
-
Cooke, E.1
Jahanian, F.2
McPherson, D.3
-
7
-
-
85077680022
-
Behavior-based Spyware Detection
-
Kirda, E., Kruegel, C., Banks, G., Vigna, G., Kemmerer, R.: Behavior-based Spyware Detection. In Proc. 15th USENIX Security Symposium, August 2006.
-
(2006)
Proc. 15th USENIX Security Symposium
-
-
Kirda, E.1
Kruegel, C.2
Banks, G.3
Vigna, G.4
Kemmerer, R.5
-
8
-
-
33745203232
-
-
First Edition, Addison-Wesley, Upper Saddle River, NJ
-
Hoglund, G., Butler, J.: Rootkits: Subverting the Windows Kernel. First Edition, Addison-Wesley, Upper Saddle River, NJ, 2006.
-
(2006)
Rootkits: Subverting the Windows Kernel
-
-
Hoglund, G.1
Butler, J.2
-
10
-
-
33846315671
-
Bypassing 3rd Party Windows Buffer Overflow Protection
-
Volume 0x0b, Issue 0x3e, Phile #0x0, 7/13/2004
-
Butler, J.: Bypassing 3rd Party Windows Buffer Overflow Protection. In phrack Volume 0x0b, Issue 0x3e, Phile #0x0, 7/13/2004.
-
Phrack
-
-
Butler, J.1
-
11
-
-
85084160792
-
Understanding Data Lifetime via Whole System Simulation
-
Chow, J., Pfaff, B., Garfinkel, T., Christopher, K., Rosenblum, M.: Understanding Data Lifetime via Whole System Simulation. In Proc. of the USENIX 13th Security Symposium, August 2004.
-
(2004)
Proc. of the USENIX 13th Security Symposium
-
-
Chow, J.1
Pfaff, B.2
Garfinkel, T.3
Christopher, K.4
Rosenblum, M.5
-
12
-
-
79953672829
-
Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software
-
Newsome, J., Song, D.: Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software. In Network and Distributed Systems Symposium, February 2005.
-
(2005)
Network and Distributed Systems Symposium
-
-
Newsome, J.1
Song, D.2
-
13
-
-
18844437024
-
Detection of Injected, Dynamically Generated, and Obfuscated Malicious Code
-
Rabek, J., Khazan, R., Lewandowski, S., Cunningham, R.: Detection of Injected, Dynamically Generated, and Obfuscated Malicious Code. In Proc. of the ACM Workshop on Rapid Malcode, October 2003.
-
(2003)
Proc. of the ACM Workshop On Rapid Malcode
-
-
Rabek, J.1
Khazan, R.2
Lewandowski, S.3
Cunningham, R.4
-
17
-
-
34547415753
-
Bots and Botnets: Risks, Issues, and Prevention
-
Ireland, October
-
Overton, M.: Bots and Botnets: Risks, Issues, and Prevention. In Virus Bulletin Conference, Dublin, Ireland, October 2005.
-
(2005)
Virus Bulletin Conference, Dublin
-
-
Overton, M.1
-
19
-
-
84882763796
-
-
Perlsec
-
Perlsec http://perldoc.perl.org/perlsec.html
-
-
-
-
20
-
-
0029716418
-
A Sense of Self for Unix Processes
-
Forrest, S., Hofmeyr, S., Somayaji, A., Longstaff, T.: A Sense of Self for Unix Processes. In IEEE Symposium on Security and Privacy, May 1996.
-
(1996)
IEEE Symposium On Security and Privacy
-
-
Forrest, S.1
Hofmeyr, S.2
Somayaji, A.3
Longstaff, T.4
-
21
-
-
84924375780
-
Botz-4-Sale: Surviving Organized DDoS Attacks That Mimic Flash Crowds
-
Kandula, S., Katabi, D., Jacob, M., Berger, A.: Botz-4-Sale: Surviving Organized DDoS Attacks That Mimic Flash Crowds. In Network and Distributed System Security Symposium, May 2005.
-
(2005)
Network and Distributed System Security Symposium
-
-
Kandula, S.1
Katabi, D.2
Jacob, M.3
Berger, A.4
-
25
-
-
85084164620
-
Detecting format string vulnerabilities with type qualifiers
-
Shankar, U., Talwar, K., Foster, J., Wagner, D.: Detecting format string vulnerabilities with type qualifiers. In Proc. 10th USENIX Security Symp., Aug. 2001.
-
(2001)
Proc. 10th USENIX Security Symp
-
-
Shankar, U.1
Talwar, K.2
Foster, J.3
Wagner, D.4
-
27
-
-
84882767160
-
Money Bots: Hackers Cash In on Hijacked PCs
-
Sept
-
Naraine, R. Money Bots: Hackers Cash In on Hijacked PCs. eWeek, Sept. 2006.
-
(2006)
EWeek
-
-
Naraine, R.1
-
30
-
-
84882768941
-
Bot Networks Behind Big Boost In Phishing Attacks
-
Nov
-
Keizer, G.: Bot Networks Behind Big Boost In Phishing Attacks. TechWeb, Nov. 2004.
-
(2004)
TechWeb
-
-
Keizer, G.1
-
33
-
-
84882749053
-
-
Symantec Internet Security Threat Report, Published
-
Symantec Internet Security Threat Report, Trends for July 05-December 05. Volume IX, Published March 2006.
-
(2006)
Trends For July 05-December 05
, vol.9
-
-
-
35
-
-
84882756965
-
-
Symantec Internet Security Threat Report
-
Symantec Internet Security Threat Report, Trends for January 06-June 06, Volume X. Published September 2006.
-
(2006)
Trends For January 06-June 06
, vol.10
-
-
-
37
-
-
34547399387
-
A Multifaceted Approach to Understanding the Botnet Phenomenon
-
Rajab, M., Zarfoss, J., Monrose, F., Terzis, A.: A Multifaceted Approach to Understanding the Botnet Phenomenon. In Proc. of ACM SIGCOMM/USENIX Internet Measurement Conference, October 2006.
-
(2006)
Proc. of ACM SIGCOMM/USENIX Internet Measurement Conference
-
-
Rajab, M.1
Zarfoss, J.2
Monrose, F.3
Terzis, A.4
-
39
-
-
45749156009
-
-
Manuscript
-
Gu, G., Porras, P., Yegneswaran, V., Fong, M., Lee, W.: BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation. Manuscript.
-
BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation
-
-
Gu, G.1
Porras, P.2
Yegneswaran, V.3
Fong, M.4
Lee, W.5
-
42
-
-
56549123031
-
-
Microsoft Technical Report MSR-TR-2005-25
-
Wang, Y., Beck, D., Vo, B., Roussev, R., Verbowski, C.: Detecting Stealth Software with Strider GhostBuster. Microsoft Technical Report MSR-TR-2005-25.
-
Detecting Stealth Software With Strider GhostBuster
-
-
Wang, Y.1
Beck, D.2
Vo, B.3
Roussev, R.4
Verbowski, C.5
-
43
-
-
34547381072
-
Puppetnets: Misusing Web Browsers as a Distributed Attack Infrastructure
-
Lam, V., Antonatos, S., Akritidis, P., Anagnostakis, K.: Puppetnets: Misusing Web Browsers as a Distributed Attack Infrastructure. In the 13th ACM Conference on Computer and Communications Security, October 2006.
-
(2006)
The 13th ACM Conference On Computer and Communications Security
-
-
Lam, V.1
Antonatos, S.2
Akritidis, P.3
Anagnostakis, K.4
-
45
-
-
84882796700
-
-
Mirc Help, Viruses, Trojans, and Worms
-
Mirc Help, Viruses, Trojans, and Worms.
-
-
-
|