-
2
-
-
84880515365
-
The compromised observer effect
-
F. F. X. Lindner, "The compromised observer effect," McAfee Security J., vol. 6, 2010.
-
(2010)
McAfee Security J
, vol.6
-
-
Lindner, F.F.X.1
-
3
-
-
79959561018
-
Some thoughts on security after ten years of qmail 1.0
-
D. J. Bernstein, "Some thoughts on security after ten years of qmail 1.0," in Proc. ACM CSAW, 2007, pp. 1-10.
-
(2007)
Proc. ACM CSAW
, pp. 1-10
-
-
Bernstein, D.J.1
-
4
-
-
0017472779
-
Proving the correctness of multiprocess programs
-
Mar
-
L. Lamport, "Proving the correctness of multiprocess programs," IEEE Trans. Softw. Eng., vol. 3, no. 2, pp. 125-143, Mar. 1977.
-
(1977)
IEEE Trans. Softw. Eng
, vol.3
, Issue.2
, pp. 125-143
-
-
Lamport, L.1
-
5
-
-
70350238531
-
Software model checking
-
R. Jhala and R. Majumdar, "Software model checking," ACM Comput. Surv., vol. 41, no. 4, 2009.
-
(2009)
ACM Comput. Surv
, vol.41
, Issue.4
-
-
Jhala, R.1
Majumdar, R.2
-
7
-
-
84880560861
-
Extending Bleichenbacher's forgery attack
-
Sep
-
T. Izu, T. Shimoyama, and M. Takenaka, "Extending Bleichenbacher's forgery attack," J. Inform. Process., vol. 16, pp. 122-129, Sep. 2008.
-
(2008)
J. Inform. Process
, vol.16
, pp. 122-129
-
-
Izu, T.1
Shimoyama, T.2
Takenaka, M.3
-
8
-
-
77955313164
-
PKI layer cake: New collision attacks against the global X.509 infrastructure
-
Berlin, Germany Springer
-
D. Kaminsky, M. L. Patterson, and L. Sassaman, "PKI layer cake: New collision attacks against the global X.509 infrastructure," in Financial Cryptography. Berlin, Germany: Springer, 2010, pp. 289-303.
-
(2010)
Financial Cryptography
, pp. 289-303
-
-
Kaminsky, D.1
Patterson, M.L.2
Sassaman, L.3
-
9
-
-
0034905530
-
L(A) = L(B)? decidability results from complete formal systems
-
DOI 10.1016/S0304-3975(00)00285-1, PII S0304397500002851
-
G. Śenizergues, "L(A) = L(B)? Decidability results from complete formal systems," Theor. Comput. Sci., vol. 251, nos. 1-2, pp. 1-166, 2001. (Pubitemid 32674076)
-
(2001)
Theoretical Computer Science
, vol.251
, Issue.1-2
, pp. 1-166
-
-
Senizergues, G.1
-
11
-
-
26444481880
-
A simple proof for the turing-completeness of XSLT and xQuery
-
S. Kepser, "A simple proof for the turing-completeness of XSLT and xQuery," in Proc. Extreme Markup Lang., 2004.
-
(2004)
Proc. Extreme Markup Lang
-
-
Kepser, S.1
-
12
-
-
33749387412
-
XSLT version 2.0 is turing-complete: A purely transformation based proof
-
Implementation and Application of Automata - 11th International Conference, CIAA 2006, Proceedings
-
R. Onder and Z. Bayram, "XSLT version 2.0 is turing-complete: A purely transformation based proof," in Proc. Implementation Appl. Automata, LNCS 4094. 2006, pp. 275-276. (Pubitemid 44503283)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4094 LNCS
, pp. 275-276
-
-
Onder, R.1
Bayram, Z.2
-
14
-
-
8744267587
-
Universality in Elementary Cellular Automata
-
M. Cook, "Universality in elementary cellular automata," Complex Syst., vol. 15, no. 1, pp. 1-40, 2004. (Pubitemid 39203440)
-
(2004)
Complex Systems Champaign
, vol.15
, Issue.1
, pp. 1-40
-
-
Cook, M.1
-
17
-
-
85040933729
-
TRX: A formally verified parser interpreter
-
Proc. Prog. Lang. Syst
-
A. Koprowski and H. Binsztok, "TRX: A formally verified parser interpreter," in Proc. Prog. Lang. Syst., LNCS 6012. 2010, pp. 345-365.
-
(2010)
LNCS
, vol.6012
, pp. 345-365
-
-
Koprowski, A.1
Binsztok, H.2
-
19
-
-
49749213366
-
On certain formal properties of grammars
-
N. Chomsky, "On certain formal properties of grammars," Inform. Comput./Inform. Control, vol. 2, pp. 137-167, 1959.
-
(1959)
Inform. Comput./Inform. Control
, vol.2
, pp. 137-167
-
-
Chomsky, N.1
-
23
-
-
84893143817
-
Discoverer: Automatic protocol reverse engineering from network traces
-
W. Cui, J. Kannan, and H. J. Wang, "Discoverer: Automatic protocol reverse engineering from network traces," in Proc. USENIX Sec. Symp., 2007.
-
(2007)
Proc. USENIX Sec. Symp
-
-
Cui, W.1
Kannan, J.2
Wang, H.J.3
-
24
-
-
84880515631
-
-
Jun
-
R. Fielding, J. Gettys, J. Mogul, H. Frystyk, L. Masinter, P. Leach, and T. Berners-Lee, Hypertext Transfer Protocol: HTTP/1.1, Request for Comments: 2616, Jun. 1999.
-
(1999)
Hypertext Transfer Protocol: HTTP/1.1. Request for Comments
, vol.2616
-
-
Fielding, R.1
Gettys, J.2
Mogul, J.3
Frystyk, H.4
Masinter, L.5
Leach, P.6
Berners-Lee, T.7
-
26
-
-
84880531411
-
A study on visual programming extension of JavaScript
-
Mar.
-
W. Ali, K. Sultana, and S. Pervez, "A study on visual programming extension of JavaScript," Int. J. Comput. Appl., vol. 17, no. 1, pp. 13-19, Mar. 2011.
-
(2011)
Int. J. Comput. Appl
, vol.17
, Issue.1
, pp. 13-19
-
-
Ali, W.1
Sultana, K.2
Pervez, S.3
-
27
-
-
84880520550
-
A final solution to the dangling else of ALGOL 60 and related languages
-
Sep
-
P. W. Abrahams, "A final solution to the dangling else of ALGOL 60 and related languages," Commun. ACM, vol. 9, pp. 679-682, Sep. 1966.
-
(1966)
Commun ACM
, vol.9
, pp. 679-682
-
-
Abrahams, P.W.1
-
28
-
-
0001621268
-
On the translation of languages from left to right
-
D. E. Knuth, "On the translation of languages from left to right," Inform. Control, vol. 8, no. 6, pp. 607-639, 1965.
-
(1965)
Inform. Control
, vol.8
, Issue.6
, pp. 607-639
-
-
Knuth, D.E.1
-
29
-
-
70349381520
-
The usability of ambiguity detection methods for context-free grammars
-
Oct
-
H. J. S. Basten, "The usability of ambiguity detection methods for context-free grammars," Electron. Notes Theor. Comput. Sci., vol. 238, pp. 35-46, Oct. 2009.
-
(2009)
Electron. Notes Theor. Comput. Sci
, vol.238
, pp. 35-46
-
-
Basten, H.J.S.1
-
30
-
-
50149119692
-
On ambiguity in phrase structure languages
-
Oct
-
R. W. Floyd, "On ambiguity in phrase structure languages," Commun. ACM, vol. 5, p. 526, Oct. 1962.
-
(1962)
Commun ACM
, vol.5
, pp. 526
-
-
Floyd, R.W.1
-
31
-
-
84856043672
-
A mathematical theory of communication
-
Jul
-
C. E. Shannon, "A mathematical theory of communication," Bell Syst. Tech. J., vol. 27, pp. 379-423, Jul. 1948.
-
(1948)
Bell Syst. Tech. J
, vol.27
, pp. 379-423
-
-
Shannon, C.E.1
-
34
-
-
84945708698
-
An axiomatic basis for computer programming
-
C. A. R. Hoare, "An axiomatic basis for computer programming," Commu. ACM, vol. 12, no. 10, pp. 576-583, 1969.
-
(1969)
Commu ACM
, vol.12
, Issue.10
, pp. 576-583
-
-
Hoare, C.A.R.1
-
36
-
-
84945713135
-
Applying dsign by contract
-
Oct
-
B. Meyer, "Applying dsign by contract," Computer, vol. 25, pp. 40-51, Oct. 1992.
-
(1992)
Computer
, vol.25
, pp. 40-51
-
-
Meyer, B.1
-
38
-
-
84880565791
-
-
Jan
-
T. Berners-Lee, R. Fielding, and L. Masinter, RFC 3986, Uniform Resource Identifier (URI): Generic Syntax, Request for Comments: 3986. Jan. 2005.
-
(2005)
RFC 3986, Uniform Resource Identifier (URI): Generic Syntax, Request for Comments
, vol.3986
-
-
Berners-Lee, T.1
Fielding, R.2
Masinter, L.3
-
41
-
-
33745213901
-
Defending against injection attacks through context-sensitive string evaluation
-
T. Pietraszek and C. V. Berghe, "Defending against injection attacks through context-sensitive string evaluation," in Proc. RAID, 2005, pp. 124-145.
-
(2005)
Proc. RAID
, pp. 124-145
-
-
Pietraszek, T.1
Berghe, C.V.2
-
43
-
-
84880529329
-
-
rix Aug Phrack [Online]
-
rix. (2001, Aug.). Writing ia32 alphanumeric shellcodes. Phrack [Online]. 57(5). Available: http://www.phrack.com/issues.html?issue=57\ &id=15
-
(2001)
Writing ia32 Alphanumeric Shellcodes
, vol.57
, pp. 5
-
-
-
44
-
-
84880566270
-
-
Nergal Dec Phrack [Online]
-
Nergal. (2001, Dec.). The advanced return-into-lib(c) exploits: PaX case study. Phrack [Online]. 58(4). Available: http://www.phrack.com/issues.html? issue=58&id=4
-
(2001)
The Advanced Return-into-lib(c) Exploits: PaX Case Study
, vol.58
, pp. 4
-
-
-
45
-
-
71549168416
-
-
to be published
-
R. Roemer, E. Buchanan, H. Shacham, and S. Savage, "Return-oriented programming: Systems, languages, and applications," to be published.
-
Return-oriented Programming: Systems, Languages, and Applications
-
-
Roemer, R.1
Buchanan, E.2
Shacham, H.3
Savage, S.4
-
46
-
-
77952351839
-
The geometry of innocent flesh on the bone: Return-intolibc without function calls (on the x86)
-
H. Shacham, "The geometry of innocent flesh on the bone: Return-intolibc without function calls (on the x86)," in Proc. CCS, 2007.
-
(2007)
Proc. CCS
-
-
Shacham, H.1
-
47
-
-
14844288825
-
-
Jul Phrack [Online]
-
T. Durden. (2002, Jul.). Bypassing PaX ASLR protection. Phrack [Online]. 59(9). Available: http://www.phrack.com/issues.html?issue= 59\&id=9
-
(2002)
Bypassing PaX ASLR Protection
, vol.59
, pp. 9
-
-
Durden, T.1
-
48
-
-
0006100649
-
-
Aug Phrack [Online]
-
A. One. (1996, Aug.). Smashing the stack for fun and profit. Phrack [Online]. 49(14). Available: http://www.phrack.com/issues.html?issue= 49\&id=14
-
(1996)
Smashing the Stack for Fun and Profit
, vol.49
, pp. 14
-
-
One, A.1
-
49
-
-
84880556811
-
-
MaXX Phrack [Online]
-
MaXX. Vudo malloc Tricks. Phrack [Online]. 57(8). Available: http://phrack.org/issues.html?issue=57&id=8
-
Vudo Malloc Tricks
, vol.57
, pp. 8
-
-
-
50
-
-
84880540965
-
-
Anonymous author Phrack [Online]
-
Anonymous author. Once upon a free(). Phrack [Online]. 57(9). Available: http://phrack.org/issues.html?issue=57&id=9
-
Once Upon A Free
, vol.57
, pp. 9
-
-
-
51
-
-
84880565899
-
-
jp Aug Phrack [Online]
-
jp. (2003, Aug.). Advanced Doug Lea's malloc exploits. Phrack [Online]. 61(6). Available: http://www.phrack.com/issues.html?issue=61\ &id=6
-
(2003)
Advanced Doug Lea's Malloc Exploits
, vol.61
, pp. 6
-
-
-
52
-
-
12344288334
-
-
Sep [Online] Available
-
T. Newsham. (2000, Sep.). Format String Attacks [Online]. Available: http://www.thenewsh.com/?newsham/format-string-attacks.pdf
-
(2000)
Format String Attacks
-
-
Newsham, T.1
-
55
-
-
26444575798
-
A learning-based approach to the detection of SQL attacks
-
Detection of Instructions and Malware, and Vulnerability Assessment: Second International Conference, DIMVA 2005. Proceedings
-
F. Valeur, D. Mutz, and G. Vigna, "A learning-based approach to the detection of SQL attacks," in Proc. DIMVA, Jul. 2005, pp. 123-140. (Pubitemid 41423153)
-
(2005)
Lecture Notes in Computer Science
, vol.3548
, pp. 123-140
-
-
Valeur, F.1
Mutz, D.2
Vigna, G.3
-
56
-
-
77953855187
-
Using parse tree validation to prevent SQL injection attacks
-
G. T. Buehrer, B. W. Weide, and P. A. G. Sivilotti, "Using parse tree validation to prevent SQL injection attacks," in Proc. Int. Workshop Softw. Eng. Middleware, 2005, pp. 106-113.
-
(2005)
Proc. Int. Workshop Softw. Eng. Middleware
, pp. 106-113
-
-
Buehrer, G.T.1
Weide, B.W.2
Sivilotti, P.A.G.3
-
57
-
-
77949464016
-
CANDID: Dynamic candidate evaluations for automatic prevention of SQL injection attacks
-
P. Bisht, P. Madhusudan, and V. N. Venkatakrishnan, "CANDID: Dynamic candidate evaluations for automatic prevention of SQL injection attacks," ACM Trans. Inf. Syst. Security, vol. 13, no. 2, pp. 1-39, 2010.
-
(2010)
ACM Trans. Inf. Syst. Security
, vol.13
, Issue.2
, pp. 1-39
-
-
Bisht, P.1
Madhusudan, P.2
Venkatakrishnan, V.N.3
-
60
-
-
34648836594
-
Static checking of dynamically generated queries in database applications
-
G. Wassermann, C. Gould, Z. Su, and P. Devanbu, "Static checking of dynamically generated queries in database applications," J. ACM Trans. Softw. Eng. Methodol., vol. 16, no. 4, 2007.
-
(2007)
J. ACM Trans. Softw. Eng. Methodol
, vol.16
, Issue.4
-
-
Wassermann, G.1
Gould, C.2
Su, Z.3
Devanbu, P.4
-
61
-
-
33750143286
-
Preventing SQL injection attacks in stored procedures
-
DOI 10.1109/ASWEC.2006.40, 1615052, Proceedings - 2006 Australian Software Engineering Conference, ASWEC 2006 - Taming Complexity through Research and Practice
-
K. Wei, M. Muthuprasanna, and S. Kothari, "Preventing SQL injection attacks in stored procedures," in Proc. Aus. Softw. Eng. Conf., 2006, pp. 191-198. (Pubitemid 44592153)
-
(2006)
Proceedings of the Australian Software Engineering Conference, ASWEC
, vol.2006
, pp. 191-198
-
-
Wei, K.1
Muthuprasanna, M.2
Kothari, S.3
-
62
-
-
35348910884
-
Eliminating SQL injection attacks: A transparent defense mechanism
-
Sep
-
M. Muthuprasanna, K. Wei, and S. Kothari, "Eliminating SQL injection attacks: A transparent defense mechanism," in Proc. 8th IEEE Int. Symp. Web Site Evol., Sep. 2006, pp. 22-32.
-
(2006)
Proc. 8th IEEE Int. Symp. Web Site Evol
, pp. 22-32
-
-
Muthuprasanna, M.1
Wei, K.2
Kothari, S.3
-
63
-
-
4544287108
-
JDBC checker: A static analysis tool for SQL/JDBC applications
-
C. Gould, Z. Su, and P. Devanbu, "JDBC checker: A static analysis tool for SQL/JDBC applications," in Proc. Int. Conf. Soft. Eng., 2004, pp. 697-698.
-
(2004)
Proc. Int. Conf. Soft. Eng
, pp. 697-698
-
-
Gould, C.1
Su, Z.2
Devanbu, P.3
-
64
-
-
35248891044
-
Precise analysis of string expressions
-
A. S. Christensen, A. Møller, and M. I. Schwartzbach, "Precise analysis of string expressions," in Proc. 10th Int. Static Anal. Symp., 2003, pp. 1-18.
-
(2003)
Proc. 10th Int. Static Anal. Symp
, pp. 1-18
-
-
Christensen, A.S.1
Møller, A.2
Schwartzbach, M.I.3
-
65
-
-
84880567176
-
Retrofitting existing web applications with effective dynamic protection against SQL injection attacks
-
Jan
-
S.-T. Sun and K. Beznosov, "Retrofitting existing web applications with effective dynamic protection against SQL injection attacks," Int. J. Secure Softw. Eng., vol. 1, pp. 20-40, Jan. 2010.
-
(2010)
Int. J. Secure Softw. Eng
, vol.1
, pp. 20-40
-
-
Sun, S.-T.1
Beznosov, K.2
-
66
-
-
77952407110
-
AMNESIA: Analysis and monitoring for NEutralizing SQL-injection attacks
-
Nov
-
W. G. J. Halfond and A. Orso, "AMNESIA: Analysis and monitoring for NEutralizing SQL-injection attacks," in Proc. ASE 2005, Nov. 2005, pp. 174-183.
-
(2005)
Proc. ASE
, vol.2005
, pp. 174-183
-
-
Halfond, W.G.J.1
Orso, A.2
-
67
-
-
34547379435
-
Using positive tainting and syntax-aware evaluation to counter SQL injection attacks
-
DOI 10.1145/1181775.1181797, 1181797, Proceedings of the 14th ACM SIGSOFT International Symposium on Foundations of Software Engineering
-
W. Halfond, A. Orso, and P. Manolios, "Using positive tainting and syntax-aware evaluation to counter SQL injection attacks," in Proc. FSE 2006, Nov. 2006, pp. 175-185. (Pubitemid 47129395)
-
(2006)
Proceedings of the ACM SIGSOFT Symposium on the Foundations of Software Engineering
, pp. 175-185
-
-
Halfond, W.G.J.1
Orso, A.2
Manolios, P.3
-
69
-
-
52449092059
-
SQL-IDS: A specification-based approach for SQL-injection detection
-
K. Kemalis and T. Tzouramanis, "SQL-IDS: A specification-based approach for SQL-injection detection," in Proc. Symp. Appl. Comput., 2008, pp. 2153-2158.
-
(2008)
Proc. Symp. Appl. Comput
, pp. 2153-2158
-
-
Kemalis, K.1
Tzouramanis, T.2
-
70
-
-
72949084588
-
SQLProb: A proxybased architecture toward preventing SQL injection attacks
-
A. Liu, Y. Yuan, D. Wijesekera, and A. Stavrou, "SQLProb: A proxybased architecture toward preventing SQL injection attacks," in Proc. ACM Symp. Appl. Comput., 2009, pp. 2054-2061.
-
(2009)
Proc. ACM Symp. Appl. Comput
, pp. 2054-2061
-
-
Liu, A.1
Yuan, Y.2
Wijesekera, D.3
Stavrou, A.4
-
73
-
-
0001538613
-
Semantics of context-free languages
-
D. Knuth, "Semantics of context-free languages," Math. Syst. Theory, vol. 2, pp. 127-145, 1968.
-
(1968)
Math. Syst. Theory
, vol.2
, pp. 127-145
-
-
Knuth, D.1
-
74
-
-
77955332716
-
-
Mar [Online] Available
-
B. Kaliski. (1998, Mar.). PKCS 1: RSA Encryption [Online]. Available: http://tools.ietf.org/html/rfc2313
-
(1998)
PKCS 1: RSA Encryption
-
-
Kaliski, B.1
-
75
-
-
1442287671
-
Parsing expression grammars: A recognition-based syntactic foundation
-
B. Ford, "Parsing expression grammars: A recognition-based syntactic foundation," in Proc. 31st ACM SIGPLAN-SIGACT Symp. POPL, 2004 pp. 111-122.
-
(2004)
Proc. 31st ACM SIGPLAN-SIGACT Symp. POPL
, pp. 111-122
-
-
Ford, B.1
-
76
-
-
33750093555
-
Measuring relative attack surfaces
-
D. T. Lee, S. P. Shieh, and J. D. Tygar, Eds. New York: Springer
-
M. Howard, J. Pincus, and J. Wing, "Measuring relative attack surfaces," in Computer Security in the 21st Century, D. T. Lee, S. P. Shieh, and J. D. Tygar, Eds. New York: Springer, 2005, pp. 109-137.
-
(2005)
Computer Security in the 21st Century
, pp. 109-137
-
-
Howard, M.1
Pincus, J.2
Wing, J.3
-
77
-
-
51049122345
-
Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation list (CRL) Profile
-
4325, 4630 May
-
D. Cooper, S. Santesson, S. Farrell, S. Boeyen, R. Housley, and W. Polk, Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation list (CRL) Profile, RFC 5280, Obsoletes RFCs 3280, 4325, 4630, May 2008.
-
(2008)
RFC 5280, Obsoletes RFCs
, vol.3280
-
-
Cooper, D.1
Santesson, S.2
Farrell, S.3
Boeyen, S.4
Housley, R.5
Polk, W.6
-
79
-
-
24344478834
-
Practical traffic analysis: Extending and resisting statistical disclosure
-
May
-
N. Mathewson and R. Dingledine, "Practical traffic analysis: Extending and resisting statistical disclosure," in Proc. PET Workshop, LNCS 3424. May 2004, pp. 17-34.
-
(2004)
Proc. PET Workshop, LNCS
, vol.3424
, pp. 17-34
-
-
Mathewson, N.1
Dingledine, R.2
-
80
-
-
84880544409
-
Failures in a hybrid content blocking system
-
R. Clayton, "Failures in a hybrid content blocking system," in Proc. Fifth PET Workshop, 2005, p. 1.
-
(2005)
Proc. Fifth PET Workshop
, pp. 1
-
-
Clayton, R.1
-
81
-
-
84880515365
-
The compromised observer effect
-
F. Lindner, "The compromised observer effect," McAfee Security J., vol. 6, 2010.
-
(2010)
McAfee Security J
, vol.6
-
-
Lindner, F.1
-
82
-
-
0004145058
-
-
Secure Networks, Inc., West Palm Beach, FL, Tech. Rep
-
T. Ptacek, T. Newsham, and H. J. Simpson, "Insertion, evasion, and denial of service: Eluding network intrusion detection," Secure Networks, Inc., West Palm Beach, FL, Tech. Rep., 1998.
-
(1998)
Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection
-
-
Ptacek, T.1
Newsham, T.2
Simpson, H.J.3
-
83
-
-
36448995658
-
-
Sys-Security Group, Tech. Rep., version 3.0
-
O. Arkin, "ICMP usage in scanning, the complete know-how," Sys-Security Group, Tech. Rep., version 3.0, 2001.
-
(2001)
ICMP Usage in Scanning, the Complete Know-how
-
-
Arkin, O.1
-
84
-
-
85084160972
-
Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics
-
M Handley, V. Paxson, and C. Kreibich, "Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics," in Proc. 10th USENIX Security Symp., 2001, p. 9.
-
(2001)
Proc. 10th USENIX Security Symp
, pp. 9
-
-
Handley, M.1
Paxson, V.2
Kreibich, C.3
-
85
-
-
0038825042
-
Active mapping: Resisting NIDS evasion without altering traffic
-
May
-
U. Shankar and V. Paxson, "Active mapping: Resisting NIDS evasion without altering traffic," in Proc. IEEE Symp. Security Privacy, May 2003, pp. 44-61.
-
(2003)
Proc. IEEE Symp. Security Privacy
, pp. 44-61
-
-
Shankar, U.1
Paxson, V.2
-
86
-
-
77949414424
-
-
Dec [Online]. Available
-
S. Siddharth. (2005, Dec.). Evading NIDS, Revisited [Online]. Available: http://www.symantec.com/connect/articles/evading-nids-revisited
-
(2005)
Evading NIDS, Revisited
-
-
Siddharth, S.1
-
87
-
-
85180527583
-
Traps and pitfalls: Practical problems in system call interposition based security tools
-
Feb
-
T. Garfinkel, "Traps and pitfalls: Practical problems in system call interposition based security tools," in Proc. Netw. Distributed Syst. Security Symp., Feb. 2003, pp. 163-176.
-
(2003)
Proc. Netw. Distributed Syst. Security Symp
, pp. 163-176
-
-
Garfinkel, T.1
-
88
-
-
0032313923
-
Intrusion detection system using sequences of system calls
-
S. A. Hofmeyr, A. Somayaji, and S. Forrest, "Intrusion detection system using sequences of system calls," J. Comput. Security, vol. 6, no. 3, pp. 151-180, 1998.
-
(1998)
J. Comput. Security
, vol.6
, Issue.3
, pp. 151-180
-
-
Hofmeyr, S.A.1
Somayaji, A.2
Forrest, S.3
-
89
-
-
0038825045
-
Anomaly detection using call stack information
-
May
-
H. H. Feng, O. Kolesnikov, P. Fogla, W. Lee, and W. Gong, "Anomaly detection using call stack information," in Proc. IEEE Symp. Security Privacy, May 2003, p. 62.
-
(2003)
Proc. IEEE Symp. Security Privacy
, pp. 62
-
-
Feng, H.H.1
Kolesnikov, O.2
Fogla, P.3
Lee, W.4
Gong, W.5
-
90
-
-
0038011184
-
Mimicry attacks on host-based intrusion detection systems
-
Nov
-
D. Wagner and P. Soto, "Mimicry attacks on host-based intrusion detection systems," in Proc. ACM Conf. CCS, Nov. 2002, pp. 255-264.
-
(2002)
Proc. ACM Conf. CCS
, pp. 255-264
-
-
Wagner, D.1
Soto, P.2
-
91
-
-
36949007362
-
Challenging the anomaly detection paradigm a provocative discussion
-
DOI 10.1145/1278940.1278945, Proceedings - New Security Paradigms Workshop 2006
-
C. Taylor and C. Gates, "Challenging the anomaly detection paradigm: A provocative discussion," in Proc. 15th NSPW, Sep. 2006, pp. 21-29. (Pubitemid 350239697)
-
(2007)
Proceedings New Security Paradigms Workshop
, pp. 21-29
-
-
Gates, C.1
Taylor, C.2
-
92
-
-
77955209381
-
Outside the closed world: On using machine learning for network intrusion detection
-
May
-
R. Sommer and V. Paxson, "Outside the closed world: On using machine learning for network intrusion detection," in Proc. IEEE Symp. Security Privacy, May 2010, pp. 305-316.
-
(2010)
Proc. IEEE Symp. Security Privacy
, pp. 305-316
-
-
Sommer, R.1
Paxson, V.2
-
93
-
-
84957039800
-
Principles of a computer immune system
-
A. Somayaji, S. Hofmeyer, and S. Forrest, "Principles of a computer immune system," in Proc. NPSW, 1998, pp. 75-82.
-
(1998)
Proc. NPSW
, pp. 75-82
-
-
Somayaji, A.1
Hofmeyer, S.2
Forrest, S.3
-
95
-
-
84881225236
-
Enforceable security policies
-
Feb
-
F. B. Schneider, "Enforceable security policies," ACM Trans. Inf. Syst. Secur., vol. 3, pp. 30-50, Feb. 2000.
-
(2000)
ACM Trans. Inf. Syst. Secur
, vol.3
, pp. 30-50
-
-
Schneider, F.B.1
-
96
-
-
84884203329
-
Modular verification of security protocol code by typing
-
K. Bhargavan, C. Fournet, and A. D. Gordon, "Modular verification of security protocol code by typing," SIGPLAN Not., vol. 45, 2010.
-
(2010)
SIGPLAN Not
, vol.45
-
-
Bhargavan, K.1
Fournet, C.2
Gordon, A.D.3
-
97
-
-
70350543796
-
ASPIER: An automated framework for verifying security protocol implementations
-
S. Chaki and A. Datta, "ASPIER: An automated framework for verifying security protocol implementations," in Proc. CSF, 2009, pp. 172-185.
-
(2009)
Proc. CSF
, pp. 172-185
-
-
Chaki, S.1
Datta, A.2
|