-
1
-
-
0004072686
-
-
Addison-Wesley Longman Publishing, Boston, MA
-
AHO, A. V., SETHI, R., AND ULLMAN, J. D. 1986. Compilers: Principles, Techniques, and Tools. Addison-Wesley Longman Publishing, Boston, MA.
-
(1986)
Compilers: Principles, Techniques, and Tools
-
-
Aho, A.V.1
Sethi, R.2
Ullman, J.D.3
-
2
-
-
84866362135
-
Stride: Polymorphic sled detection through instruction sequence analysis
-
R. Sasaki, S. Qing, E. Okamoto, and H. Yoshiura, Eds., Springer
-
AKRITIDIS, P.,MARKATOS, E., POLYCHRONAKIS, M., AND ANAGNOSTAKIS, K. 2005. Stride: Polymorphic sled detection through instruction sequence analysis. In Proceedings of the 20thIFIP International Conference on Security and Privacy in the Age of Ubiquitous Computing. R. Sasaki, S. Qing, E. Okamoto, and H. Yoshiura, Eds., Springer, 375-391.
-
(2005)
Proceedings of the 20thIFIP International Conference on Security and Privacy in the Age of Ubiquitous Computing
, pp. 375-391
-
-
Akritidis, P.1
Markatos, E.2
Polychronakis, M.3
Anagnostakis, K.4
-
3
-
-
85068725031
-
Building a dynamic reputation system for DNS
-
ANTONAKAKIS, M., PERDISCI, R., DAGON, D., LEE, W., AND FEAMSTER, N. 2010. Building a dynamic reputation system for DNS. In Proceedings of the 19th USENIX Security Symposium.
-
(2010)
Proceedings of the 19th USENIX Security Symposium
-
-
Antonakakis, M.1
Perdisci, R.2
Dagon, D.3
Lee, W.4
Feamster, N.5
-
5
-
-
66249147541
-
A survey of botnet technology and defenses
-
BAILEY, M., COOKE, E., JAHANIAN, F., XU, Y., AND KARIR, M. 2009. A survey of botnet technology and defenses. In Proceedings of the Cybersecurity Applications and Technology Conference for Homeland Security (CATCH'09). 299-304.
-
(2009)
Proceedings of the Cybersecurity Applications and Technology Conference for Homeland Security (CATCH'09)
, pp. 299-304
-
-
Bailey, M.1
Cooke, E.2
Jahanian, F.3
Xu, Y.4
Karir, M.5
-
6
-
-
38149089416
-
Automated classification and analysis of internetmalware
-
Springer
-
BAILEY, M.,OBERHEIDE, J.,ANDERSEN, J.,MAO, Z. M., JAHANIAN, F., AND NAZARIO, J. 2007. Automated classification and analysis of internetmalware. In Proceedings of the 10th International Conference on Recent Advances in Intrusion Detection (RAID'07). Springer, 178-197.
-
(2007)
Proceedings of the 10th International Conference on Recent Advances in Intrusion Detection (RAID'07)
, pp. 178-197
-
-
Bailey, M.1
Oberheide, J.2
Andersen, J.3
Mao, Z.M.4
Jahanian, F.5
Nazario, J.6
-
7
-
-
84948145339
-
Automated discovery of parameter pollution vulnerabilities in web applications
-
BALDUZZI, M., GIMENEZ, C. T., BALZAROTTI, D., AND KIRDA, E. 2011. Automated discovery of parameter pollution vulnerabilities in web applications. In Proceedings of the 18th Annual Network and Distributed System Security Symposium (NDSS'11).
-
(2011)
Proceedings of the 18th Annual Network and Distributed System Security Symposium (NDSS'11)
-
-
Balduzzi, M.1
Gimenez, C.T.2
Balzarotti, D.3
Kirda, E.4
-
8
-
-
50249115131
-
Saner: Composing static and dynamic analysis to validate sanitization in web applications
-
IEEE Computer Society, Los Alamitos, CA
-
BALZAROTTI, D., COVA, M., FELMETSGER, V., JOVANOVIC, N., KIRDA, E., KRUEGEL, C., AND VIGNA, G. 2008. Saner: Composing static and dynamic analysis to validate sanitization in web applications. In Proceedings of the IEEE Symposium on Security and Privacy. IEEE Computer Society, Los Alamitos, CA, 387-401.
-
(2008)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 387-401
-
-
Balzarotti, D.1
Cova, M.2
Felmetsger, V.3
Jovanovic, N.4
Kirda, E.5
Kruegel, C.6
Vigna, G.7
-
9
-
-
77955207391
-
State of the art: Automated black-box web application vulnerability testing
-
IEEE Computer Society, Los Alamitos, CA
-
BAU, J.,BURSZTEIN, E.,GUPTA, D., ANDMITCHELL, J. 2010. State of the art: Automated black-box web application vulnerability testing. In Proceedings of the IEEE Symposium on Security and Privacy (SP'10). IEEE Computer Society, Los Alamitos, CA, 332-345.
-
(2010)
Proceedings of the IEEE Symposium on Security and Privacy (SP'10)
, pp. 332-345
-
-
Bau, J.1
Bursztein, E.2
Gupta, D.3
Andmitchell, J.4
-
10
-
-
27544461178
-
Detecting stealth software with strider ghostbuster
-
IEEE Computer Society, Los Alamitos, CA
-
BECK, D., VO, B., AND VERBOWSKI, C. 2005. Detecting stealth software with strider ghostbuster. In Proceedings of the International Conference on Dependable Systems and Networks (DSN'05). IEEE Computer Society, Los Alamitos, CA, 368-377.
-
(2005)
Proceedings of the International Conference on Dependable Systems and Networks (DSN'05)
, pp. 368-377
-
-
Beck, D.1
Vo, B.2
Verbowski, C.3
-
11
-
-
84922594806
-
Exposure: Finding malicious domains using passive dns analysis
-
BILGE, L.,KIRDA, E.,KRUEGEL, C., AND BALDUZZI, M. 2011. Exposure: Finding malicious domains using passive dns analysis. In Proceedings of the 18th Annual Network and Distributed System Security Symposium (NDSS'11).
-
(2011)
Proceedings of the 18th Annual Network and Distributed System Security Symposium (NDSS'11)
-
-
Bilge, L.1
Kirda, E.2
Kruegel, C.3
Balduzzi, M.4
-
12
-
-
0003659021
-
-
BIND VULNERABILITIES
-
BIND VULNERABILITIES. 1998. Multiple vulnerabilities in bind. ftp://info.cert.org/pub/certadvisories/CA-98.05.bindproblems.
-
(1998)
Multiple Vulnerabilities in Bind
-
-
-
13
-
-
78549259165
-
On the analysis of the zeus botnet crimeware toolkit
-
BINSALLEEH, H., ORMEROD, T., BOUKHTOUTA, A., SINHA, P., YOUSSEF, A., DEBBABI, M., AND WANG, L. 2010. On the analysis of the zeus botnet crimeware toolkit. In Proceedings of the 8th Annual International Conference on Privacy, Security and Trust (PST'10). 31-38.
-
(2010)
Proceedings of the 8th Annual International Conference on Privacy, Security and Trust (PST'10)
, pp. 31-38
-
-
Binsalleeh, H.1
Ormerod, T.2
Boukhtouta, A.3
Sinha, P.4
Youssef, A.5
Debbabi, M.6
Wang, L.7
-
14
-
-
84855413818
-
Tomato: A trustworthy code mashup development tool
-
CHANG, J.,VENKATASUBRAMANIAN, K.,WEST, A. G.,KANNAN, S., SOKOLSKY, O.,KIM, M. J., AND LEE, I. 2011. Tomato: A trustworthy code mashup development tool. In Proceedings of the 5th International Workshop on Web APIs and Service Mashups (MASHUPS'11).
-
(2011)
Proceedings of the 5th International Workshop on Web APIs and Service Mashups (MASHUPS'11)
-
-
Chang, J.1
Venkatasubramanian, K.2
West, A.G.3
Kannan, S.4
Sokolsky, O.5
Kim, M.J.6
Lee, I.7
-
15
-
-
48349106416
-
-
Springer
-
CHRISTODORESCU, M., JHA, S.,MAUGHAN, D., SONG, D., AND WANG, C. 2007. Malware Detection. Springer.
-
(2007)
Malware Detection
-
-
Christodorescu, M.1
Jha, S.2
Maughan, D.3
Song, D.4
Wang, C.5
-
16
-
-
85206053539
-
-
Chrome MALWARE
-
CHROME MALWARE. 2010. New drive-by attack targets google chrome users. http://downloadsquad.switched.com/2010/04/20/new-drive-by-attack-targets-google- chrome-users/.
-
(2010)
New Drive-by Attack Targets Google Chrome Users
-
-
-
17
-
-
70450253203
-
Staged information ow for javascript
-
ACM Press, New York
-
CHUGH, R.,MEISTER, J. A., JHALA, R., AND LERNER, S. 2009. Staged information ow for javascript. In Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI'09). ACM Press, New York, 50-62.
-
(2009)
Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI'09)
, pp. 50-62
-
-
Chugh, R.1
Meister, J.A.2
Jhala, R.3
Lerner, S.4
-
18
-
-
77954566293
-
Detection and analysis of drive-by-download attacks and malicious javascript code
-
ACM Press, New York
-
COVA, M., KRUEGEL, C., AND VIGNA, G. 2010a. Detection and analysis of drive-by-download attacks and malicious javascript code. In Proceedings of the 19th International Conference on World Wide Web (WWW'10). ACM Press, New York, 281-290.
-
(2010)
Proceedings of the 19th International Conference on World Wide Web (WWW'10)
, pp. 281-290
-
-
Cova, M.1
Kruegel, C.2
Vigna, G.3
-
19
-
-
78249283520
-
An analysis of rogue av campaigns
-
S. Jha, R. Sommer, and C. Kreibich, Eds., Lecture Notes in Computer Science, vol. 6307, Springer
-
COVA, M., LEITA, C., THONNARD, O., KEROMYTIS, A., AND DACIER, M. 2010b. An analysis of rogue av campaigns. In Proceedings of the 13th International Conference on Recent Advances in Intrusion Detection. S. Jha, R. Sommer, and C. Kreibich, Eds., Lecture Notes in Computer Science, vol. 6307, Springer, 442-463.
-
(2010)
Proceedings of the 13th International Conference on Recent Advances in Intrusion Detection
, pp. 442-463
-
-
Cova, M.1
Leita, C.2
Thonnard, O.3
Keromytis, A.4
Dacier, M.5
-
20
-
-
33751067472
-
A safety-oriented platform for web applications
-
IEEE Computer Society, Los Alamitos, CA
-
COX, R. S.,GRIBBLE, S. D.,LEVY, H. M., AND HANSEN, J. G. 2006. A safety-oriented platform for web applications. In Proceedings of the IEEE Symposium on Security and Privacy. IEEE Computer Society, Los Alamitos, CA, 350-364.
-
(2006)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 350-364
-
-
Cox, R.S.1
Gribble, S.D.2
Levy, H.M.3
Hansen, J.G.4
-
21
-
-
70349300102
-
Omash: Enabling secure web mashups via object abstractions
-
ACM Press, New York
-
CRITES, S., HSU, F., AND CHEN, H. 2008. Omash: Enabling secure web mashups via object abstractions. In Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS'08). ACM Press, New York, 99-108.
-
(2008)
Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS'08)
, pp. 99-108
-
-
Crites, S.1
Hsu, F.2
Chen, H.3
-
22
-
-
80155141906
-
-
Tech. rep. MSR-TR-2010-156, Microsoft Research
-
CURTSINGER, C., LIVSHITS, B., ZORN, B., AND SEIFERT, C. 2010. Zozzle: Low-overhead mostly static javascript malware detection. Tech. rep. MSR-TR-2010-156, Microsoft Research.
-
(2010)
Zozzle: Low-overhead Mostly Static Javascript Malware Detection
-
-
Curtsinger, C.1
Livshits, B.2
Zorn, B.3
Seifert, C.4
-
23
-
-
85084162419
-
Engineering heap overow exploits with javascript
-
USENIX Association, Berkeley, CA
-
DANIEL, M., HONOROFF, J., AND MILLER, C. 2008. Engineering heap overow exploits with javascript. In Proceedings of the 2nd Conference on USENIX Workshop on Offensive Technologies. USENIX Association, Berkeley, CA, 1:1-1:6.
-
(2008)
Proceedings of the 2nd Conference on USENIX Workshop on Offensive Technologies
, pp. 11-16
-
-
Daniel, M.1
Honoroff, J.2
Miller, C.3
-
25
-
-
70449466618
-
A survey of botnet and botnet detection
-
FEILY, M., SHAHRESTANI, A., AND RAMADASS, S. 2009. A survey of botnet and botnet detection. In Proceedings of the 3rd International Conference on Emerging Security Information, Systems and Technologies (SECURWARE'09). 268-273.
-
(2009)
Proceedings of the 3rd International Conference on Emerging Security Information, Systems and Technologies (SECURWARE'09)
, pp. 268-273
-
-
Feily, M.1
Shahrestani, A.2
Ramadass, S.3
-
26
-
-
77954525433
-
Caffeine monkey: Automated collection, detection and analysis of malicious javascript
-
FEINSTEIN, B. AND PECK, D. 2007. Caffeine monkey: Automated collection, detection and analysis of malicious javascript. In Proceedings of BlackHat USA. https://www.blackhat.com/presentations/bh-usa-07/Feinstein and Peck/Whitepaper/bh-usa-07-feinstein and peck-WP.pdf.
-
(2007)
Proceedings of BlackHat USA
-
-
Feinstein, B.1
Peck, D.2
-
27
-
-
57349123036
-
Can you infect me now? Malware propagation in mobile phone networks
-
ACM Press, New York
-
FLEIZACH, C., LILJENSTAM, M., JOHANSSON, P., VOELKER, G. M., AND MEHES, A. 2007. Can you infect me now? Malware propagation in mobile phone networks. In Proceedings of the ACM Workshop on Recurring Malcode (WORM'07). ACM Press, New York, 61-68.
-
(2007)
Proceedings of the ACM Workshop on Recurring Malcode (WORM'07)
, pp. 61-68
-
-
Fleizach, C.1
Liljenstam, M.2
Johansson, P.3
Voelker, G.M.4
Mehes, A.5
-
28
-
-
77949898398
-
Taint-based directed whitebox fuzzing
-
IEEE Computer Society, Los Alamitos, CA
-
GANESH, V., LEEK, T., AND RINARD, M. 2009. Taint-based directed whitebox fuzzing. In Proceedings of the 31st International Conference on Software Engineering (ICSE'09). IEEE Computer Society, Los Alamitos, CA, 474-484.
-
(2009)
Proceedings of the 31st International Conference on Software Engineering (ICSE'09)
, pp. 474-484
-
-
Ganesh, V.1
Leek, T.2
Rinard, M.3
-
30
-
-
0042456767
-
-
O'Reilly and Associates, Sebastopol, CA
-
GARFINKEL, S. AND SPAFFORD, G. 2001. Web Security, Privacy and Commerce 2nd Ed. O'Reilly and Associates, Sebastopol, CA.
-
(2001)
Web Security, Privacy and Commerce 2nd Ed
-
-
Garfinkel, S.1
Spafford, G.2
-
31
-
-
84881472647
-
Survey of security vulnerabilities in session initiation protocol
-
GENEIATAKIS, D., DAGIUKLAS, T., KAMBOURAKIS, G., LAMBRINOUDAKIS, C., GRITZALIS, S., EHLERT, S., AND SISALEM, D. 2006. Survey of security vulnerabilities in session initiation protocol. IEEE Comm. Surv. Tutorials 8, 68-81.
-
(2006)
IEEE Comm. Surv. Tutorials
, vol.8
, pp. 68-81
-
-
Geneiatakis, D.1
Dagiuklas, T.2
Kambourakis, G.3
Lambrinoudakis, C.4
Gritzalis, S.5
Ehlert, S.6
Sisalem, D.7
-
32
-
-
85206044015
-
-
Google Safe Browsing PROJECT
-
GOOGLE SAFE BROWSING PROJECT. 2011. Google safe browsing api homepage. http://code.google.com/apis/safebrowsing/.
-
(2011)
Google Safe Browsing Api Homepage
-
-
-
33
-
-
71449127664
-
-
GOOGLE WEB INDEX. 2008. We knew the web was big. http://googleblog. blogspot.com/2008/07/we-knew-webwas-big.html.
-
(2008)
We Knew the Web Was Big
-
-
-
34
-
-
50249182906
-
Secure web browsing with the op web browser
-
IEEE Computer Society, Los Alamitos, CA
-
GRIER, C., TANG, S., AND KING, S. T. 2008. Secure web browsing with the op web browser. In Proceedings of the IEEE Symposium on Security and Privacy. IEEE Computer Society, Los Alamitos, CA, 402-416.
-
(2008)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 402-416
-
-
Grier, C.1
Tang, S.2
King, S.T.3
-
35
-
-
84890883068
-
Gatekeeper: Mostly static enforcement of security and reliability policies for javascript code
-
USENIX Association, Berkeley, CA
-
GUARNIERI, S. AND LIVSHITS, B. 2009. Gatekeeper: Mostly static enforcement of security and reliability policies for javascript code. In Proceedings of the 18th Conference on USENIX Security Symposium (SSYM'09). USENIX Association, Berkeley, CA, 151-168.
-
(2009)
Proceedings of the 18th Conference on USENIX Security Symposium (SSYM'09)
, pp. 151-168
-
-
Guarnieri, S.1
Livshits, B.2
-
38
-
-
79952092763
-
Survey on artificial immune system as a bioinspired technique for anomaly based intrusion detection systems
-
HOSSEINPOUR, F., BAKAR, K.,HARDOROUDI, A., AND KAZAZI, N. 2010. Survey on artificial immune system as a bioinspired technique for anomaly based intrusion detection systems. In Proceedings of the 2nd International Conference on Intelligent Networking and Collaborative Systems (INCOS'10). 323-324.
-
(2010)
Proceedings of the 2nd International Conference on Intelligent Networking and Collaborative Systems (INCOS'10)
, pp. 323-324
-
-
Hosseinpour, F.1
Bakar, K.2
Hardoroudi, A.3
Kazazi, N.4
-
39
-
-
19944365247
-
Securing web application code by static analysis and runtime protection
-
ACM Press, New York
-
HUANG, Y.-W., YU, F., HANG, C., TSAI, C.-H., LEE, D.-T., AND KUO, S.-Y. 2004. Securing web application code by static analysis and runtime protection. In Proceedings of the 13th International Conference on World Wide Web (WWW'04). ACM Press, New York, 40-52.
-
(2004)
Proceedings of the 13th International Conference on World Wide Web (WWW'04)
, pp. 40-52
-
-
Huang, Y.-W.1
Yu, F.2
Hang, C.3
Tsai, C.-H.4
Lee, D.-T.5
Kuo, S.-Y.6
-
40
-
-
56549084673
-
-
Tech. rep. 286, Purdue University, Department of Computer Science
-
IDIKA, N. ANDMATHUR, A. P. 2010. A survey ofmalware detection techniques. Tech. rep. 286, Purdue University, Department of Computer Science. http://www.internetworldstats.com/stats.htm.
-
(2010)
A Survey Ofmalware Detection Techniques
-
-
Idika, N.1
Andmathur, A.P.2
-
42
-
-
48349134267
-
Behavioral detection of malware: From a survey towards an established taxonomy
-
JACOB, G., DEBAR, H., AND FILIOL, E. 2008. Behavioral detection of malware: From a survey towards an established taxonomy. J. Comput. Virol. 4, 251-266.
-
(2008)
J. Comput. Virol.
, vol.4
, pp. 251-266
-
-
Jacob, G.1
Debar, H.2
Filiol, E.3
-
43
-
-
77950815572
-
Application-level isolation and recovery with solitude
-
ACM Press, New York
-
JAIN, S., SHAFIQUE, F., DJERIC, V., AND GOEL, A. 2008. Application-level isolation and recovery with solitude. In Proceedings of the 3rd ACM SIGOPS/EuroSys European Conference on Computer Systems (Eurosys'08). ACM Press, New York, 95-107.
-
(2008)
Proceedings of the 3rd ACM SIGOPS/EuroSys European Conference on Computer Systems (Eurosys'08)
, pp. 95-107
-
-
Jain, S.1
Shafique, F.2
Djeric, V.3
Goel, A.4
-
44
-
-
35348860223
-
Defeating script injection attacks with browser-enforced embedded policies
-
ACM Press, New York
-
JIM, T., SWAMY, N., AND HICKS, M. 2007. Defeating script injection attacks with browser-enforced embedded policies. In Proceedings of the 16th International Conference on World Wide Web (WWW'07). ACM Press, New York, 601-610.
-
(2007)
Proceedings of the 16th International Conference on World Wide Web (WWW'07)
, pp. 601-610
-
-
Jim, T.1
Swamy, N.2
Hicks, M.3
-
45
-
-
33845409634
-
Detecting past and present intrusions through vulnerability-specific predicates
-
ACM Press, New York
-
JOSHI, A., KING, S. T., DUNLAP, G. W., AND CHEN, P. M. 2005. Detecting past and present intrusions through vulnerability-specific predicates. In Proceedings of the 20th ACM Symposium on Operating Systems Principles (SOSP'05). ACM Press, New York, 91-104.
-
(2005)
Proceedings of the 20th ACM Symposium on Operating Systems Principles (SOSP'05)
, pp. 91-104
-
-
Joshi, A.1
King, S.T.2
Dunlap, G.W.3
Chen, P.M.4
-
46
-
-
33751027156
-
Pixy: A static analysis tool for detecting web application vulnerabilities (short paper)
-
IEEE Computer Society, Los Alamitos, CA
-
JOVANOVIC, N., KRUEGEL, C., AND KIRDA, E. 2006a. Pixy: A static analysis tool for detecting web application vulnerabilities (short paper). In Proceedings of the IEEE Symposium on Security and Privacy. IEEE Computer Society, Los Alamitos, CA, 258-263.
-
(2006)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 258-263
-
-
Jovanovic, N.1
Kruegel, C.2
Kirda, E.3
-
47
-
-
33745934031
-
Precise alias analysis for static detection of web application vulnerabilities
-
ACM Press, New York
-
JOVANOVIC, N., KRUEGEL, C., AND KIRDA, E. 2006b. Precise alias analysis for static detection of web application vulnerabilities. In Proceedings of the Workshop on Programming Languages and Analysis for Security (PLAS'06). ACM Press, New York, 27-36.
-
(2006)
Proceedings of the Workshop on Programming Languages and Analysis for Security (PLAS'06)
, pp. 27-36
-
-
Jovanovic, N.1
Kruegel, C.2
Kirda, E.3
-
48
-
-
70349272437
-
Spamalytics: An empirical analysis of spam marketing conversion
-
KANICH, C., KREIBICH, C., LEVCHENKO, K., ENRIGHT, B., VOELKER, G. M., PAXSON, V., AND SAVAGE, S. 2008. Spamalytics: An empirical analysis of spam marketing conversion. In Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS'08). 3-14.
-
(2008)
Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS'08)
, pp. 3-14
-
-
Kanich, C.1
Kreibich, C.2
Levchenko, K.3
Enright, B.4
Voelker, G.M.5
Paxson, V.6
Savage, S.7
-
49
-
-
33751032654
-
Noxes: A client-side solution for mitigating crosssite scripting attacks
-
ACM Press, New York
-
KIRDA, E., KRUEGEL, C., VIGNA, G., AND JOVANOVIC, N. 2006. Noxes: A client-side solution for mitigating crosssite scripting attacks. In Proceedings of the ACM Symposium on Applied Computing (SAC'06). ACM Press, New York, 330-337.
-
(2006)
Proceedings of the ACM Symposium on Applied Computing (SAC'06)
, pp. 330-337
-
-
Kirda, E.1
Kruegel, C.2
Vigna, G.3
Jovanovic, N.4
-
51
-
-
77950880816
-
Securing web applications with static and dynamic information flow tracking
-
ACM Press, New York
-
LAM, M. S.,MARTIN, M., LIVSHITS, B., AND WHALEY, J. 2008. Securing web applications with static and dynamic information flow tracking. In Proceedings of the ACM SIGPLAN Symposium on Partial Evaluation and Semantics-Based Program Manipulation (PEPM'08). ACM Press, New York, 3-12.
-
(2008)
Proceedings of the ACM SIGPLAN Symposium on Partial Evaluation and Semantics-Based Program Manipulation (PEPM'08)
, pp. 3-12
-
-
Lam, M.S.1
Martin, M.2
Livshits, B.3
Whaley, J.4
-
52
-
-
36248965112
-
Web 2.0 creates security challenges
-
LAWTON, G. 2007. Web 2.0 creates security challenges. Comput. 40, 10, 13-16.
-
(2007)
Comput.
, vol.40
, Issue.10
, pp. 13-16
-
-
Lawton, G.1
-
53
-
-
77951447962
-
Botnet: Survey and case study
-
LI, C., JIANG, W., AND ZOU, X. 2009. Botnet: Survey and case study. In Proceedings of the 4th International Conference on Innovative Computing, Information and Control (ICICIC'09). 1184-1187.
-
(2009)
Proceedings of the 4th International Conference on Innovative Computing, Information and Control (ICICIC'09)
, pp. 1184-1187
-
-
Li, C.1
Jiang, W.2
Zou, X.3
-
54
-
-
77953145744
-
A survey of internet worm detection and containment
-
LI, P., SALOUR, M., AND SU, X. 2008. A survey of internet worm detection and containment. IEEE Comm. Surv. Tutorials 10, 1, 20-35.
-
(2008)
IEEE Comm. Surv. Tutorials
, vol.10
, Issue.1
, pp. 20-35
-
-
Li, P.1
Salour, M.2
Su, X.3
-
55
-
-
85030494194
-
Webshield: Enabling various web defense techniques without client side modifications
-
LI, Z., TANG, Y., CAO, Y., RASTOGI, V., CHEN, Y., AND LIU, B. 2011. Webshield: Enabling various web defense techniques without client side modifications. In Proceedings of the 18th Annual Network and Distributed System Security Symposium (NDSS'11).
-
(2011)
Proceedings of the 18th Annual Network and Distributed System Security Symposium (NDSS'11)
-
-
Li, Z.1
Tang, Y.2
Cao, Y.3
Rastogi, V.4
Chen, Y.5
Liu, B.6
-
56
-
-
34249295260
-
Building web 2.0
-
LIN, K.-J. 2007. Building web 2.0. Comput. 40, 5, 101-102.
-
(2007)
Comput.
, vol.40
, Issue.5
, pp. 101-102
-
-
Lin, K.-J.1
-
57
-
-
78650002259
-
Blade: An attack-agnostic approach for preventing driveby malware infections
-
ACM Press, New York
-
LU, L.,YEGNESWARAN, V.,PORRAS, P., AND LEE,W. 2010. Blade: An attack-agnostic approach for preventing driveby malware infections. In Proceedings of the 17th ACM Conference on Computer and Communications Security (CCS'10). ACM Press, New York, 440-450.
-
(2010)
Proceedings of the 17th ACM Conference on Computer and Communications Security (CCS'10)
, pp. 440-450
-
-
Lu, L.1
Yegneswaran, V.2
Porras, P.3
Lee, W.4
-
58
-
-
0027609384
-
A survey of intrusion detection techniques
-
LUNT, T. F. 1993. A survey of intrusion detection techniques. Comput. Secur. 12, 4, 405-418.
-
(1993)
Comput. Secur.
, vol.12
, Issue.4
, pp. 405-418
-
-
Lunt, T.F.1
-
59
-
-
70350630557
-
Beyond blacklists: Learning to detect malicious websites from suspicious urls
-
ACM Press, New York
-
MA, J., SAUL, L. K., SAVAGE, S., AND VOELKER, G. M. 2009. Beyond blacklists: Learning to detect malicious websites from suspicious urls. In Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD'09). ACM Press, New York, 1245-1254.
-
(2009)
Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD'09)
, pp. 1245-1254
-
-
Ma, J.1
Saul, L.K.2
Savage, S.3
Voelker, G.M.4
-
60
-
-
77954492783
-
A lattice-based approach to mashup security
-
ACM Press, New York
-
MAGAZINIUS, J., ASKAROV, A., AND SABELFELD, A. 2010. A lattice-based approach to mashup security. In Proceedings of the 5th ACMSymposium on Information, Computer and Communications Security (ASIACCS'10). ACM Press, New York, 15-23.
-
(2010)
Proceedings of the 5th ACMSymposium on Information, Computer and Communications Security (ASIACCS'10)
, pp. 15-23
-
-
Magazinius, J.1
Askarov, A.2
Sabelfeld, A.3
-
62
-
-
34548737161
-
Exploring multiple execution paths for malware analysis
-
IEEE Computer Society, Los Alamitos, CA
-
MOSER, A., KRUEGEL, C., AND KIRDA, E. 2007. Exploring multiple execution paths for malware analysis. In Proceedings of the IEEE Symposium on Security and Privacy (SP'07). IEEE Computer Society, Los Alamitos, CA, 231-245.
-
(2007)
Proceedings of the IEEE Symposium on Security and Privacy (SP'07)
, pp. 231-245
-
-
Moser, A.1
Kruegel, C.2
Kirda, E.3
-
63
-
-
85076893377
-
Spyproxy: Execution-based detection of malicious web content
-
USENIX Association, Berkeley, CA
-
MOSHCHUK, A., BRAGIN, T., DEVILLE, D., GRIBBLE, S. D., AND LEVY, H. M. 2007. Spyproxy: Execution-based detection of malicious web content. In Proceedings of the 16th USENIX Security Symposium. USENIX Association, Berkeley, CA, 3:1-3:16.
-
(2007)
Proceedings of the 16th USENIX Security Symposium
, pp. 31-316
-
-
Moshchuk, A.1
Bragin, T.2
Deville, D.3
Gribble, S.D.4
Levy, H.M.5
-
64
-
-
85077681170
-
A crawler-based study of spyware on the web
-
MOSHCHUK, E., BRAGIN, T.,GRIBBLE, S. D., AND LEVY, H. M. 2006. A crawler-based study of spyware on the web. In Proceedings of Network and Distributed System Security Symposium (NDSS'06).
-
(2006)
Proceedings of Network and Distributed System Security Symposium (NDSS'06)
-
-
Moshchuk, E.1
Bragin, T.2
Gribble, S.D.3
Levy, H.M.4
-
65
-
-
85076285223
-
Re: Captchas: Understanding captcha-solving services in an economic context
-
USENIX Association, Berkeley, CA
-
MOTOYAMA, M., LEVCHENKO, K., KANICH, C., MCCOY, D., VOELKER, G. M., AND SAVAGE, S. 2010. Re: Captchas: Understanding captcha-solving services in an economic context. In Proceedings of the 19th USENIX Conference on Security. USENIX Association, Berkeley, CA, 28-28.
-
(2010)
Proceedings of the 19th USENIX Conference on Security
, pp. 28-28
-
-
Motoyama, M.1
Levchenko, K.2
Kanich, C.3
McCoy, D.4
Voelker, G.M.5
Savage, S.6
-
66
-
-
0028430224
-
Network intrusion detection
-
MUKHERJEE, B., HEBERLEIN, L., AND LEVITT, K. 1994. Network intrusion detection. IEEE Netw. 8, 3, 26-41.
-
(1994)
IEEE Netw.
, vol.8
, Issue.3
, pp. 26-41
-
-
Mukherjee, B.1
Heberlein, L.2
Levitt, K.3
-
68
-
-
85084094793
-
Phoneyc: A virtual client honeypot
-
USENIX Association, Berkeley, CA
-
NAZARIO, J. 2009. Phoneyc: A virtual client honeypot. In Proceedings of the 2nd USENIX Conference on Large-Scale Exploits and Emergent Threats: Botnets, Spyware, Worms, and More (LEET'09). USENIX Association, Berkeley, CA, 6-6.
-
(2009)
Proceedings of the 2nd USENIX Conference on Large-Scale Exploits and Emergent Threats: Botnets, Spyware, Worms, and More (LEET'09)
, pp. 6-6
-
-
Nazario, J.1
-
69
-
-
79952066459
-
Defaming botnet toolkits: A bottom-up approach to mitigating the threat
-
ORMEROD, T.,WANG, L.,DEBBABI, M.,YOUSSEF, A.,BINSALLEEH, H.,BOUKHTOUTA, A., AND SINHA, P. 2010. Defaming botnet toolkits: A bottom-up approach to mitigating the threat. In Proceedings of the 1st International Conference on Emerging Security Information Systems and Technologies (SECURWARE'10). 195-200.
-
(2010)
Proceedings of the 1st International Conference on Emerging Security Information Systems and Technologies (SECURWARE'10)
, pp. 195-200
-
-
Ormerod, T.1
Wang, L.2
Debbabi, M.3
Youssef, A.4
Binsalleeh, H.5
Boukhtouta, A.6
Sinha, P.7
-
70
-
-
34147099073
-
Survey of network-based defense mechanisms countering the dos and ddos problems
-
PENG, T., LECKIE, C., AND RAMAMOHANARAO, K. 2007. Survey of network-based defense mechanisms countering the dos and ddos problems. ACM Comput. Surv. 39, 1.
-
(2007)
ACM Comput. Surv.
, vol.39
, pp. 1
-
-
Peng, T.1
Leckie, C.2
Ramamohanarao, K.3
-
71
-
-
38149093160
-
Emulation-based detection of non-selfcontained polymorphic shellcode
-
Springer
-
POLYCHRONAKIS, M., ANAGNOSTAKIS, K. G., AND MARKATOS, E. P. 2007. Emulation-based detection of non-selfcontained polymorphic shellcode. In Proceedings of the 10th International Conference on Recent Advances in Intrusion Detection (RAID'07). Springer, 87-106.
-
(2007)
Proceedings of the 10th International Conference on Recent Advances in Intrusion Detection (RAID'07)
, pp. 87-106
-
-
Polychronakis, M.1
Anagnostakis, K.G.2
Markatos, E.P.3
-
72
-
-
85084094824
-
Ghost turns zombie: Exploring the life cycle of web-based malware
-
USENIX Association, Berkeley, CA
-
POLYCHRONAKIS, M., MAVROMMATIS, P., AND PROVOS, N. 2008. Ghost turns zombie: exploring the life cycle of web-based malware. In Proceedings of the 1st USENIX Workshop on Large-Scale Exploits and Emergent Threats. USENIX Association, Berkeley, CA, 11:1-11:8.
-
(2008)
Proceedings of the 1st USENIX Workshop on Large-Scale Exploits and Emergent Threats
, pp. 111-118
-
-
Polychronakis, M.1
Mavrommatis, P.2
Provos, N.3
-
73
-
-
80053650188
-
All your iframes point to us
-
PROVOS, N.,MAVROMMATIS, P., RAJAB, M. A., AND MONROSE, F. 2008. All your iframes point to us. In Proceedings of the USENIX Security Symposium. 1-16.
-
(2008)
Proceedings of the USENIX Security Symposium
, pp. 1-16
-
-
Provos, N.1
Mavrommatis, P.2
Rajab, M.A.3
Monrose, F.4
-
74
-
-
85080711655
-
The ghost in the browser analysis of web-based malware
-
USENIX Association, Berkeley, CA
-
PROVOS, N., MCNAMEE, D., MAVROMMATIS, P., WANG, K., AND MODADUGU, N. 2007. The ghost in the browser analysis of web-based malware. In Proceedings of the 1st Conference on the 1st Workshop on Hot Topics in Understanding Botnets. USENIX Association, Berkeley, CA, 4-4.
-
(2007)
Proceedings of the 1st Conference on the 1st Workshop on Hot Topics in Understanding Botnets
, pp. 4-4
-
-
Provos, N.1
McNamee, D.2
Mavrommatis, P.3
Wang, K.4
Modadugu, N.5
-
75
-
-
19944374456
-
A survey and trends on internet worms
-
QING, S. AND WEN, W. 2005. A survey and trends on internet worms. Comput. Secur. 24, 4, 334-346.
-
(2005)
Comput. Secur.
, vol.24
, Issue.4
, pp. 334-346
-
-
Qing, S.1
Wen, W.2
-
76
-
-
84924734121
-
Nozzle: A defense against heap-spraying code injection attacks
-
USENIX Association, Berkeley, CA
-
RATANAWORABHAN, P., LIVSHITS, B., AND ZORN, B. 2009. Nozzle: A defense against heap-spraying code injection attacks. In Proceedings of the 18th Conference on USENIX Security Symposium (SSYM'09). USENIX Association, Berkeley, CA, 169-186.
-
(2009)
Proceedings of the 18th Conference on USENIX Security Symposium (SSYM'09)
, pp. 169-186
-
-
Ratanaworabhan, P.1
Livshits, B.2
Zorn, B.3
-
78
-
-
85076780225
-
Browsershield: Vulnerability-driven filtering of dynamic html
-
USENIX Association, Berkeley, CA
-
REIS, C., DUNAGAN, J., WANG, H. J., DUBROVSKY, O., AND ESMEIR, S. 2006. Browsershield: Vulnerability-driven filtering of dynamic html. In Proceedings of the 7th Symposium on Operating Systems Design and Implementation (OSDI'06). USENIX Association, Berkeley, CA, 61-74.
-
(2006)
Proceedings of the 7th Symposium on Operating Systems Design and Implementation (OSDI'06)
, pp. 61-74
-
-
Reis, C.1
Dunagan, J.2
Wang, H.J.3
Dubrovsky, O.4
Esmeir, S.5
-
80
-
-
84885235188
-
-
RFC-2828.
-
RFC-2828. 2000. IETF RFC 2828. http://tools.ietf.org/html/rfc2828/.
-
(2000)
IETF RFC 2828
-
-
-
83
-
-
0032164210
-
A survey of web security
-
RUBIN, A. AND GEER, D. E., J. 1998. A survey of web security. Comput. 31, 9, 34-41.
-
(1998)
Comput.
, vol.31
, Issue.9
, pp. 34-41
-
-
Rubin, A.1
Geer, D.E.J.2
-
85
-
-
35348864382
-
Web mashup scripting language
-
ACM Press, New York
-
SABBOUH, M., HIGGINSON, J., SEMY, S., AND GAGNE, D. 2007. Web mashup scripting language. In Proceedings of the 16th International Conference on World Wide Web (WWW'07). ACM Press, New York, 1305-1306.
-
(2007)
Proceedings of the 16th International Conference on World Wide Web (WWW'07)
, pp. 1305-1306
-
-
Sabbouh, M.1
Higginson, J.2
Semy, S.3
Gagne, D.4
-
87
-
-
85133875019
-
Alert correlation survey: Framework and techniques
-
ACM Press, New York
-
SADODDIN, R. AND GHORBANI, A. 2006. Alert correlation survey: Framework and techniques. In Proceedings of the International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services (PST'06). ACM Press, New York, 37:1-37:10.
-
(2006)
Proceedings of the International Conference on Privacy, Security and Trust: Bridge the Gap between PST Technologies and Business Services (PST'06)
, pp. 371-3710
-
-
Sadoddin, R.1
Ghorbani, A.2
-
88
-
-
77955220343
-
A symbolic execution framework for javascript
-
IEEE Computer Society, Los Alamitos, CA
-
SAXENA, P.,AKHAWE, D.,HANNA, S.,MAO, F.,MCCAMANT, S., AND SONG, D. 2010a. A symbolic execution framework for javascript. In Proceedings of the IEEE Symposium on Security and Privacy (SP'10). IEEE Computer Society, Los Alamitos, CA, 513-528.
-
(2010)
Proceedings of the IEEE Symposium on Security and Privacy (SP'10)
, pp. 513-528
-
-
Saxena, P.1
Akhawe, D.2
Hanna, S.3
Mao, F.4
McCamant, S.5
Song, D.6
-
89
-
-
80051946867
-
Flax: Systematic discovery of client-side validation vulnerabilities in rich web applications
-
SAXENA, P.,HANNA, S., POOSANKAM, P., AND SONG, D. 2010b. Flax: Systematic discovery of client-side validation vulnerabilities in rich web applications. In Proceedings of the 17th Annual Network and Distributed System Security Symposium (NDSS).
-
(2010)
Proceedings of the 17th Annual Network and Distributed System Security Symposium (NDSS)
-
-
Saxena, P.1
Hanna, S.2
Poosankam, P.3
Song, D.4
-
90
-
-
77950172440
-
Smartphone malware evolution revisited: Android next target?
-
SCHMIDT, A.-D., SCHMIDT, H.-G., BATYUK, L., CLAUSEN, J., CAMTEPE, S., ALBAYRAK, S., AND YILDIZLI, C. 2009. Smartphone malware evolution revisited: Android next target? In Proceedings of the 4th International Conference on Malicious and Unwanted Software (MALWARE'09). 1-7.
-
(2009)
Proceedings of the 4th International Conference on Malicious and Unwanted Software (MALWARE'09)
, pp. 1-7
-
-
Schmidt, A.-D.1
Schmidt, H.-G.2
Batyuk, L.3
Clausen, J.4
Camtepe, S.5
Albayrak, S.6
Yildizli, C.7
-
92
-
-
65749099969
-
Detection of malicious code by applying machine learning classifiers on static features: A state-of-the-art survey
-
SHABTAI, A.,MOSKOVITCH, R.,ELOVICI, Y., AND GLEZER, C. 2009. Detection of malicious code by applying machine learning classifiers on static features: A state-of-the-art survey. Inf. Secur. Tech. Rep. 14, 16-29.
-
(2009)
Inf. Secur. Tech. Rep.
, vol.14
, pp. 16-29
-
-
Shabtai, A.1
Moskovitch, R.2
Elovici, Y.3
Glezer, C.4
-
93
-
-
73049094155
-
A survey of data mining techniques for malware detection using file features
-
ACM Press, New York
-
SIDDIQUI, M.,WANG, M. C., AND LEE, J. 2008. A survey of data mining techniques for malware detection using file features. In Proceedings of the 46th Annual Southeast Regional Conference on XX (ACM-SE'08). ACM Press, New York, 509-510.
-
(2008)
Proceedings of the 46th Annual Southeast Regional Conference on XX (ACM-SE'08)
, pp. 509-510
-
-
Siddiqui, M.1
Wang, M.C.2
Lee, J.3
-
94
-
-
24644466576
-
An email worm vaccine architecture
-
R. Deng, F. Bao, H. Pang, and J. Zhou, Eds., Lecture Notes in Computer Science, vol. 3439, Springer
-
SIDIROGLOU, S., IOANNIDIS, J., KEROMYTIS, A., AND STOLFO, S. 2005. An email worm vaccine architecture. In Proceedings of the 1st Information Security Practice and Experience Conference. R. Deng, F. Bao, H. Pang, and J. Zhou, Eds., Lecture Notes in Computer Science, vol. 3439, Springer, 97-108.
-
(2005)
Proceedings of the 1st Information Security Practice and Experience Conference
, pp. 97-108
-
-
Sidiroglou, S.1
Ioannidis, J.2
Keromytis, A.3
Stolfo, S.4
-
95
-
-
77954497121
-
Preventing drive-by download via inter-module communication monitoring
-
ACM Press, New York
-
SONG, C., ZHUGE, J.,HAN, X., AND YE, Z. 2010. Preventing drive-by download via inter-module communication monitoring. In Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS'10). ACM Press, New York, 124-134.
-
(2010)
Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS'10)
, pp. 124-134
-
-
Song, C.1
Zhuge, J.2
Han, X.3
Ye, Z.4
-
100
-
-
85206061156
-
-
TOP TEN PROJECT
-
TOP TEN PROJECT. 2011. OWASP top ten project. http://www.owasp.org/.
-
(2011)
OWASP Top Ten Project
-
-
-
103
-
-
21844456680
-
Shield: Vulnerability-driven network filters for preventing known vulnerability exploits
-
WANG, H. J., GUO, C., SIMON, D. R., AND ZUGENMAIER, A. 2004. Shield: vulnerability-driven network filters for preventing known vulnerability exploits. SIGCOMM Comput. Comm. Rev. 34, 193-204.
-
(2004)
SIGCOMM Comput. Comm. Rev.
, vol.34
, pp. 193-204
-
-
Wang, H.J.1
Guo, C.2
Simon, D.R.3
Zugenmaier, A.4
-
104
-
-
84904088330
-
Automated web patrol with strider honeymonkeys: Finding web sites that exploit browser vulnerabilities
-
WANG, Y., BECK, D., JIANG, X., AND ROUSSEV, R. 2006. Automated web patrol with strider honeymonkeys: Finding web sites that exploit browser vulnerabilities. In Proceedings of the Network and Distributed System Security Symposium (NDSS).
-
(2006)
Proceedings of the Network and Distributed System Security Symposium (NDSS)
-
-
Wang, Y.1
Beck, D.2
Jiang, X.3
Roussev, R.4
-
105
-
-
77952114571
-
Strider: A black-box, state-based approach to change and configuration management and support
-
WANG, Y.,VERBOWSKI, C.,DUNAGAN, J.,CHEN, Y.,WANG,H. J., AND YUAN, C. 2003. Strider: A black-box, state-based approach to change and configuration management and support. In Proceedings of the 17th USENIX Conference on System Administration (LISA'03). 159-172.
-
(2003)
Proceedings of the 17th USENIX Conference on System Administration (LISA'03)
, pp. 159-172
-
-
Wang, Y.1
Verbowski, C.2
Dunagan, J.3
Chen, Y.4
Wang, H.J.5
Yuan, C.6
-
109
-
-
84910681237
-
Static detection of security vulnerabilities in scripting languages
-
USENIX Association, Berkeley, CA
-
XIE, Y. AND AIKEN, A. 2006. Static detection of security vulnerabilities in scripting languages. In Proceedings of the 15th USENIX Security Symposium. Vol. 15, USENIX Association, Berkeley, CA.
-
(2006)
Proceedings of the 15th USENIX Security Symposium
, vol.15
-
-
Xie, Y.1
Aiken, A.2
-
110
-
-
79952099736
-
Malware obfuscation techniques: A brief survey
-
IEEE Computer Society, Los Alamitos, CA
-
YOU, I. AND YIM, K. 2010. Malware obfuscation techniques: A brief survey. In Proceedings of the International Conference on Broadband, Wireless Computing, Communication and Applications (BWCCA'10). IEEE Computer Society, Los Alamitos, CA, 297-300.
-
(2010)
Proceedings of the International Conference on Broadband, Wireless Computing, Communication and Applications (BWCCA'10)
, pp. 297-300
-
-
You, I.1
Yim, K.2
-
112
-
-
77958527473
-
A taxonomy of botnet detection techniques
-
ZEIDANLOO, H.,SHOOSHTARI, M.,AMOLI, P.,SAFARI,M., AND ZAMANI,M. 2010. A taxonomy of botnet detection techniques. In Proceedings of the 3rd IEEE International Conference on Computer Science and Information Technology (ICCSIT'10). Vol 2, 158-162.
-
(2010)
Proceedings of the 3rd IEEE International Conference on Computer Science and Information Technology (ICCSIT'10)
, vol.2
, pp. 158-162
-
-
Zeidanloo, H.1
Shooshtari, M.2
Amoli, P.3
Safari, M.4
Zamani, M.5
-
113
-
-
51949093835
-
Botnet research survey
-
ZHU, Z., LU, G., CHEN, Y., FU, Z., ROBERTS, P., AND HAN, K. 2008. Botnet research survey. In Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference (COMPSAC'08). 967-972.
-
(2008)
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference (COMPSAC'08)
, pp. 967-972
-
-
Zhu, Z.1
Lu, G.2
Chen, Y.3
Fu, Z.4
Roberts, P.5
Han, K.6
|