-
1
-
-
80051640800
-
Identifying failure-correlated dependence chains
-
Berlin, March 2011
-
R. Abou-Assi, W. Masri, Identifying failure-correlated dependence chains, in: First International Workshop on Testing and Debugging, TeBug/ICST 2011, Berlin, March 2011.
-
First International Workshop on Testing and Debugging, TeBug/ICST 2011
-
-
Abou-Assi, R.1
Masri, W.2
-
2
-
-
0027621699
-
Mining association rules between sets of items in large databases
-
R. Agrawal, T. Imielinski, A. Swami, Mining association rules between sets of items in large databases, in: Proceedings of the ACM SIGMOD Conference on Management of Data, 1993, pp. 207-216.
-
(1993)
Proceedings of the ACM SIGMOD Conference on Management of Data
, pp. 207-216
-
-
Agrawal, R.1
Imielinski, T.2
Swami, A.3
-
3
-
-
33244493965
-
Mary Jean Harrold: Efficient and precise dynamic impact analysis using execute-after sequences
-
Taweesup Apiwattanapong, Alessandro Orso, Mary Jean Harrold: Efficient and precise dynamic impact analysis using execute-after sequences, ICSE, 2005, pp. 432-441.
-
(2005)
ICSE
, pp. 432-441
-
-
Apiwattanapong, T.1
Orso, A.2
-
4
-
-
84889889213
-
-
Appendices: http://webfea. fea.aub.edu. lb/fea/wm13/Appendix-E.zip
-
Appendices: < http://webfea.fea.aub.edu.lb/fea/wm13/Appendix-A-D.pdf > < http://webfea.fea.aub.edu.lb/fea/wm13/Appendix-E.zip >.
-
-
-
-
5
-
-
33745488052
-
Combining visualization and statistical analysis to improve operator confidence and efficiency for failure detection and localization
-
June 2005
-
P. Bodik, G. Friedman, L. Biewald, Combining visualization and statistical analysis to improve operator confidence and efficiency for failure detection and localization, in: Proceedings of Second Int'l Conf. Autonomic Computing (ICAC '05), June 2005, pp. 89-100.
-
Proceedings of Second Int'l Conf. Autonomic Computing (ICAC '05)
, pp. 89-100
-
-
Bodik, P.1
Friedman, G.2
Biewald, L.3
-
6
-
-
33751056900
-
Towards automatic generation of vulnerability-based signatures
-
DOI 10.1109/SP.2006.41, 1623997, Proceedings - 2006 IEEE Symposium on Security and Privacy, S+P 2006
-
D. Brumley, J. Newsome, D. Song, H. Wang, S. Jha, Towards automatic generation of vulnerability-based signatures, in: Proceedings of the 2006 IEEE Symposium on Security and Privacy, Berkeley, California, USA, May 2006, pp. 2-16. (Pubitemid 44753708)
-
(2006)
Proceedings - IEEE Symposium on Security and Privacy
, vol.2006
, pp. 2-16
-
-
Brumley, D.1
Newsome, J.2
Song, D.3
Wang, H.4
Jha, S.5
-
7
-
-
35048885595
-
Creating vulnerability signatures using weakest preconditions
-
Venice, Italy, July
-
D. Brumley, H. Wang, S. Jha, D. Song, Creating vulnerability signatures using weakest preconditions, in: Proceedings of the 20th IEEE Computer SecurityFoundations Symposium (CSF '07), Venice, Italy, July 2007.
-
(2007)
Proceedings of the 20th IEEE Computer SecurityFoundations Symposium (CSF '07)
-
-
Brumley, D.1
Wang, H.2
Jha, S.3
Song, D.4
-
9
-
-
34447323048
-
Online tracking of component interactions for failure detection and localization in distributed systems
-
DOI 10.1109/TSMCC.2007.897496
-
H. Chen, G. Jiang, C. Ungureanu, and K. Yoshihira Online tracking of component interactions for failure detection and localization in distributed systems IEEE Transactions on Systems, Man, and Cybernetics, Part C 37 4 2007 644 651 (Pubitemid 47061965)
-
(2007)
IEEE Transactions on Systems, Man and Cybernetics Part C: Applications and Reviews
, vol.37
, Issue.4
, pp. 644-651
-
-
Chen, H.1
Jiang, G.2
Ungureanu, C.3
Yoshihira, K.4
-
11
-
-
0016949746
-
A lattice model of secure information flow
-
D.E. Denning A lattice model of secure information flow Communications of the ACM 19 5 May 1976 236 242
-
(1976)
Communications of the ACM
, vol.19
, Issue.5
, pp. 236-242
-
-
Denning, D.E.1
-
12
-
-
26044480846
-
Supporting controlled experimentation with testing techniques: An infrastructure and its potential impact
-
DOI 10.1007/s10664-005-3861-2
-
Hyunsook Do, Sebastian Elbaum, and Gregg Rothermel Supporting controlled experimentation with testing techniques: an infrastructure and its potential impact Empirical Software Engineering 10 4 2005 405 435 (Pubitemid 41408554)
-
(2005)
Empirical Software Engineering
, vol.10
, Issue.4
, pp. 405-435
-
-
Do, H.1
Elbaum, S.2
Rothermel, G.3
-
13
-
-
70349916409
-
Intrusion detection using signatures extracted from execution profiles
-
SESS, Vancouver, Canada
-
M. El-Ghali, W. Masri, Intrusion detection using signatures extracted from execution profiles, in: 5th International Workshop on Software Engineering for Secure Systems, SESS, Vancouver, Canada, 2009.
-
(2009)
5th International Workshop on Software Engineering for Secure Systems
-
-
El-Ghali, M.1
Masri, W.2
-
14
-
-
0035250541
-
Dynamically discovering likely program invariants to support program evolution
-
DOI 10.1109/32.908957
-
M.D. Ernst, J. Cockrell, W.G. Griswold, and D. Notkin Dynamically discovering likely program invariants to sup-port program evolution IEEE Transactions on Software Engineering 27 2 2001 99 123 (Pubitemid 32254259)
-
(2001)
IEEE Transactions on Software Engineering
, vol.27
, Issue.2
, pp. 99-123
-
-
Ernst, M.D.1
Cockrell, J.2
Griswold, W.G.3
Notkin, D.4
-
15
-
-
0038825045
-
Anomaly detection using call stack information
-
Oakland, CA, USA, May
-
H. Feng, O. Kolesnikov, P. Fogla, W. Lee, W. Gong, Anomaly detection using call stack information, in: Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, USA, May 2003, p. 62.
-
(2003)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 62
-
-
Feng, H.1
Kolesnikov, O.2
Fogla, P.3
Lee, W.4
Gong, W.5
-
16
-
-
0029716418
-
A sense of self for Unix processes
-
Los Alamitos, CA, USA, May
-
S. Forrest, S. Hofmeyr, A. Somayaji, T. Longstaff, A sense of self for Unix processes, in: Proceedings of the 1996 IEEE Symposium on Security and Privacy, Los Alamitos, CA, USA, May 1996, pp. 120-128.
-
(1996)
Proceedings of the 1996 IEEE Symposium on Security and Privacy
, pp. 120-128
-
-
Forrest, S.1
Hofmeyr, S.2
Somayaji, A.3
Longstaff, T.4
-
17
-
-
33750298577
-
Automated discovery of mimicry attacks
-
Recent Advances in Intrusion Detection - 9th International Symposium, RAID 2006, Proceedings
-
J. Giffin, S. Jha, B. Miller, Automated discovery of mimicry attacks, in: Proceedings of the 9th International Symposium on Recent Advances in Intrusion Detection (RAID '06), Hamburg, Germany, September 2006, pp. 41-60. (Pubitemid 44617846)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4219
, pp. 41-60
-
-
Giffin, J.T.1
Jha, S.2
Miller, B.P.3
-
18
-
-
0011783904
-
An empirical study of regression test selection techniques
-
DOI 10.1145/367008.367020
-
Todd L. Graves, Mary Jean Harrold, Jung-Min Kim, and Adam A. Porter Gregg Rothermel: an empirical study of regression test selection techniques ACM Transactions on Software Engineering and Methodology 10 2 2001 184 208 (Pubitemid 33602334)
-
(2001)
ACM Transactions on Software Engineering and Methodology
, vol.10
, Issue.2
, pp. 184-208
-
-
Graves, T.L.1
Harrold, M.J.2
Kim, J.-M.3
Porter, A.4
Rothermel, G.5
-
20
-
-
0036040176
-
Visualization of test information to assist fault localization
-
J. Jones, M.J. Harrold, J. Stasko, Visualization of test information to assist fault localization, in: Proceedings of the 24th International Conference on Software Engineering, Orlando, Florida, USA, May 2002, pp. 467-477. (Pubitemid 35009133)
-
(2002)
Proceedings - International Conference on Software Engineering
, pp. 467-477
-
-
Jones, J.A.1
Harrold, M.J.2
Stasko, J.3
-
22
-
-
85084163246
-
Autograph: Toward automated, distributed worm signature detection
-
CA
-
H. Kim, B. Karp, Autograph: toward automated, distributed worm signature detection, in: Proceedings of the 13th USENIX Security Symposium, CA, 2004, pp. 271-286.
-
(2004)
Proceedings of the 13th USENIX Security Symposium
, pp. 271-286
-
-
Kim, H.1
Karp, B.2
-
23
-
-
0142157009
-
On the detection of anomalous system call arguments
-
Gjovik, Norway, October
-
C. Kruegel, D. Mutz, F. Valeur, G. Vigna, On the detection of anomalous system call arguments, in: Proceedings of the 8th European Symposium on Research in Computer Security, Gjovik, Norway, October 2003, pp. 326-343.
-
(2003)
Proceedings of the 8th European Symposium on Research in Computer Security
, pp. 326-343
-
-
Kruegel, C.1
Mutz, D.2
Valeur, F.3
Vigna, G.4
-
24
-
-
85084163349
-
Data mining approaches for intrusion detection
-
San Antonio, TX, January
-
W. Lee, S.J. Stolfo, Data mining approaches for intrusion detection, in: Proceedings of the 7th USENIX Security Symposium, San Antonio, TX, January 1998.
-
(1998)
Proceedings of the 7th USENIX Security Symposium
-
-
Lee, W.1
Stolfo, S.J.2
-
25
-
-
0032676506
-
A data mining framework for building intrusion detection models
-
IEEE Computer Society, Los Alamitos, CA
-
W. Lee, S.J. Stolfo, K.W. Mok, A data mining framework for building intrusion detection models, in: Proceedings of the 1999 IEEE Symposium on Security and Privacy, IEEE Computer Society, Los Alamitos, CA, 1999, pp. 120-132.
-
(1999)
Proceedings of the 1999 IEEE Symposium on Security and Privacy
, pp. 120-132
-
-
Lee, W.1
Stolfo, S.J.2
Mok, K.W.3
-
26
-
-
0033719706
-
Multivariate visualization in observation-based testing
-
New York, NY, USA, ACM
-
David Leon, Andy Podgurski, Lee J. White, Multivariate visualization in observation-based testing, in: Proceedings of the 2000 International Conference on Software Engineering, pages 116-125, New York, NY, USA, 2000, ACM.
-
(2000)
Proceedings of the 2000 International Conference on Software Engineering
, pp. 116-125
-
-
Leon, D.1
Podgurski, A.2
White, L.J.3
-
27
-
-
34047189734
-
Search algorithms for regression test case prioritization
-
DOI 10.1109/TSE.2007.38
-
Z. Li, M. Harman, and R.M. Hierons Search algorithms for regression test case prioritization IEEE Transactions on Software Engineering 33 4 2007 225 237 (Pubitemid 46523213)
-
(2007)
IEEE Transactions on Software Engineering
, vol.33
, Issue.4
, pp. 225-237
-
-
Li, Z.1
Harman, M.2
Hierons, R.M.3
-
28
-
-
0005983594
-
Anomaly detection: Purpose and framework
-
G. Liepins, H.S. Vaccaro, Anomaly detection: purpose and framework, 12th National Computer Security Conference, Baltimore, 1989, pp. 495-504.
-
(1989)
12th National Computer Security Conference, Baltimore
, pp. 495-504
-
-
Liepins, G.1
Vaccaro, H.S.2
-
29
-
-
84944222170
-
Analysis and results of the 1999 DARPA off-line intrusion detection evaluation
-
Springer, Toulouse, France
-
R. Lippmann, J.W. Haines, D.J. Fried, J. Korba, K. Das, Analysis and results of the 1999 DARPA off-line intrusion detection evaluation, in: Proceedings of Recent Advances in Intrusion Detection, LNCS, Springer, Toulouse, France, 2000, 162-18.
-
(2000)
Proceedings of Recent Advances in Intrusion Detection, LNCS
, pp. 162-218
-
-
Lippmann, R.1
Haines, J.W.2
Fried, D.J.3
Korba, J.4
Das, K.5
-
30
-
-
47349109259
-
Towards self-protecting enterprise applications
-
Trollhättan, Sweden, November
-
D. Lorenzoli, L. Mariani, M. Pezze, Towards self-protecting enterprise applications, in: Proceedings of the 18th IEEE International Symposium on Software Reliability (ISSRE '07), Trollhättan, Sweden, November 2007.
-
(2007)
Proceedings of the 18th IEEE International Symposium on Software Reliability (ISSRE '07)
-
-
Lorenzoli, D.1
Mariani, L.2
Pezze, M.3
-
31
-
-
85075390249
-
Discovering frequent episodes in sequences
-
Montreal, Canada, August
-
H. Mannila, H. Toivonen, A.I. Verkamo, Discovering frequent episodes in sequences, in: Proceedings of the 1st International Conference on Knowledge Discovery in Databases and Data Mining, Montreal, Canada, August 1995.
-
(1995)
Proceedings of the 1st International Conference on Knowledge Discovery in Databases and Data Mining
-
-
Mannila, H.1
Toivonen, H.2
Verkamo, A.I.3
-
32
-
-
33745203758
-
Finding application errors and security flaws using PQL: A Program Query Language
-
CA
-
M. Martin, B. Livshits, M. Lam, Finding application errors and security flaws using PQL: a Program Query Language, 20th ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications, CA, 2005, pp. 365-383.
-
(2005)
20th ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications
, pp. 365-383
-
-
Martin, M.1
Livshits, B.2
Lam, M.3
-
33
-
-
0003984174
-
-
second ed. Microsoft Press
-
Steve McConnell Code Complete second ed. 2004 Microsoft Press
-
(2004)
Code Complete
-
-
McConnell, S.1
-
34
-
-
77952777780
-
Fault localization based on information flow coverage
-
W. Masri Fault localization based on information flow coverage Software Testing, Verification and Reliability. 20 2 2010 121 147
-
(2010)
Software Testing, Verification and Reliability.
, vol.20
, Issue.2
, pp. 121-147
-
-
Masri, W.1
-
35
-
-
55049108560
-
Exploiting the empirical characteristics of program dependences for improved forward computation of dynamic slice
-
W. Masri Exploiting the empirical characteristics of program dependences for improved forward computation of dynamic slice Empirical Software Engineering (ESE) 13 2008 369 399
-
(2008)
Empirical Software Engineering (ESE)
, vol.13
, pp. 369-399
-
-
Masri, W.1
-
36
-
-
77954477544
-
Cleansing test suites from coincidental correctness to enhance fault-localization
-
ICST 2010, Paris, April
-
W. Masri, R. Abou-Assi, Cleansing test suites from coincidental correctness to enhance fault-localization, in: Third International Conference on Software Testing, Verification and Validation, ICST 2010, Paris, April, 2010.
-
(2010)
Third International Conference on Software Testing, Verification and Validation
-
-
Masri, W.1
Abou-Assi, R.2
-
37
-
-
84862321156
-
An empirical study of the factors that reduce the effectiveness of coverage-based fault localization
-
Chicago, IL
-
W. Masri, R. Abou-Assi, M. El-Ghali, N. Fatairi, An empirical study of the factors that reduce the effectiveness of coverage-based fault localization, International Workshop on Defects in Large Software Systems, DEFECTS, Chicago, IL, 2009.
-
(2009)
International Workshop on Defects in Large Software Systems, DEFECTS
-
-
Masri, W.1
Abou-Assi, R.2
El-Ghali, M.3
Fatairi, N.4
-
38
-
-
84862330016
-
Enhancing Fault Localization via Multivariate Visualization
-
Montreal, Canada, April 2012
-
W. Masri, R. Abou Assi, F. Zaraket, N. Fatairi, Enhancing Fault Localization via Multivariate Visualization, Regression/ICST 2012, Montreal, Canada, April 2012.
-
Regression/ICST 2012
-
-
Masri, W.1
Abou Assi, R.2
Zaraket, F.3
Fatairi, N.4
-
39
-
-
84858020973
-
Test case filtering and prioritization based on coverage of combinations of program elements
-
Chicago, IL
-
W. Masri, M. El-Ghali, Test case filtering and prioritization based on coverage of combinations of program elements, in: Seventh International Workshop on Dynamic Analysis, WODA, Chicago, IL, 2009.
-
(2009)
Seventh International Workshop on Dynamic Analysis, WODA
-
-
Masri, W.1
El-Ghali, M.2
-
40
-
-
79956213401
-
An algorithm for capturing variables dependences in test suites
-
W. Masri, and H. Halabi An algorithm for capturing variables dependences in test suites Journal of Systems and Software (JSS) 84 7 2011 1171 1190
-
(2011)
Journal of Systems and Software (JSS)
, vol.84
, Issue.7
, pp. 1171-1190
-
-
Masri, W.1
Halabi, H.2
-
41
-
-
53049096535
-
Application-based anomaly intrusion detection with dynamic information flow analysis
-
W. Masri, and A. Podgurski Application-based anomaly intrusion detection with dynamic information flow analysis Computers & Security 27 2008 176 187
-
(2008)
Computers & Security
, vol.27
, pp. 176-187
-
-
Masri, W.1
Podgurski, A.2
-
42
-
-
56349150784
-
Algorithms and tool support for dynamic information flow analysis
-
FEBRUARY
-
W. Masri, and A. Podgurski Algorithms and tool support for dynamic information flow analysis Information and Software Technology 51 February 2009 385 404
-
(2009)
Information and Software Technology
, vol.51
, pp. 385-404
-
-
Masri, W.1
Podgurski, A.2
-
43
-
-
77952749249
-
An empirical study of the relationship between information flow and program dependence
-
Shanghai, China, May
-
W. Masri, A. Podgurski, An empirical study of the relationship between information flow and program dependence, Fourth International Workshop on Dynamic Analysis (WODA 2006), Shanghai, China, May 2006.
-
(2006)
Fourth International Workshop on Dynamic Analysis (WODA 2006)
-
-
Masri, W.1
Podgurski, A.2
-
45
-
-
34250772325
-
An empirical study of test case filtering techniques based on exercising information flows
-
W. Masri, A. Podgurski, and D. Leon An empirical study of test case filtering techniques based on exercising information flows IEEE Transactions on Software Engineering 33 7 2007 454
-
(2007)
IEEE Transactions on Software Engineering
, vol.33
, Issue.7
, pp. 454
-
-
Masri, W.1
Podgurski, A.2
Leon, D.3
-
46
-
-
84889881577
-
-
Alpha Press Orphan Works
-
Frederic P. Miller, Agnes F. Vandome, and John McBrewster Abandonware: Computer Software, Copyright, Office Suite, Public Domain, List of Commercial Video Games Released as Freeware 2009 Alpha Press Orphan Works
-
(2009)
Abandonware: Computer Software, Copyright, Office Suite, Public Domain, List of Commercial Video Games Released As Freeware
-
-
Miller, F.P.1
Vandome, A.F.2
McBrewster, J.3
-
47
-
-
33745201000
-
Anomalous system call detection
-
Darren Mutz, Fredrik Valeur, Giovanni Vigna, and Christopher Kruegel Anomalous system call detection ACM Transactions on Information and System Security 9 1 2006 61 93
-
(2006)
ACM Transactions on Information and System Security
, vol.9
, Issue.1
, pp. 61-93
-
-
Mutz, D.1
Valeur, F.2
Vigna, G.3
Kruegel, C.4
-
49
-
-
79953672829
-
Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
-
James Newsome, Dawn Song, Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software, in: Proceedings of the 12th Annual Network and Distributed System Security Symposium (NDSS '05), 2005.
-
(2005)
Proceedings of the 12th Annual Network and Distributed System Security Symposium (NDSS '05)
-
-
Newsome, J.1
Song, D.2
-
50
-
-
84858033935
-
Using AOP for detailed runtime monitoring instrumentation
-
Amjad Nusayr, and Jonathan Cook Using AOP for detailed runtime monitoring instrumentation WODA 2009 8 14
-
(2009)
WODA
, pp. 8-14
-
-
Nusayr, A.1
Cook, J.2
-
51
-
-
80051932555
-
Are automated debugging techniques actually helping programmers?
-
C. Parnin, A. Orso, Are automated debugging techniques actually helping programmers? ISSTA 2011, pp. 199-209.
-
(2011)
ISSTA
, pp. 199-209
-
-
Parnin, C.1
Orso, A.2
-
54
-
-
32344447459
-
Cute: A concolic unit testing engine for C
-
K. Sen, D. Marinov, G. Agha, Cute: a concolic unit testing engine for C, in: 10th European, Software Engineering Conference, 2005.
-
(2005)
10th European, Software Engineering Conference
-
-
Sen, K.1
Marinov, D.2
Agha, G.3
-
55
-
-
84948456877
-
What we have learned about fighting defects
-
IEEE Computer Society, Washington, DC, USA
-
Forrest Shull, Vic Basili, Barry Boehm, A. Winsor Brown, Patricia Costa, Mikael Lindvall, Dan Port, Ioana Rus, Roseanne Tesoriero, Marvin Zelkowitz, What we have learned about fighting defects, in: Proceedings of the 8th International Symposium on Software Metrics (METRICS '02), IEEE Computer Society, Washington, DC, USA, 2002.
-
(2002)
Proceedings of the 8th International Symposium on Software Metrics (METRICS '02)
-
-
Shull, F.1
Basili, V.2
Boehm, B.3
Winsor Brown, A.4
Costa, P.5
Lindvall, M.6
Port, D.7
Rus, I.8
Tesoriero, R.9
Zelkowitz, M.10
-
56
-
-
32544433135
-
A hybrid heuristic for the maximum clique problem
-
DOI 10.1007/s10732-006-3750-x
-
A. Singh, and A.K. Gupta A hybrid heuristic for the maximum clique problem Journal of Heuristics 12 1-2 2006 5 22 (Pubitemid 43234613)
-
(2006)
Journal of Heuristics
, vol.12
, Issue.1-2
, pp. 5-22
-
-
Singh, A.1
Gupta, A.K.2
-
57
-
-
0034593043
-
JRapture: A capture/replay tool for observation-based testing
-
Portland, Oregon, August 2000
-
S. Steven, P. Chandra, B. Fleck, A. Podgurski, jRapture: a capture/replay tool for observation-based testing, 2000 International Symposium on Software Testing and Analysis, Portland, Oregon, August 2000, pp.158-167.
-
2000 International Symposium on Software Testing and Analysis
, pp. 158-167
-
-
Steven, S.1
Chandra, P.2
Fleck, B.3
Podgurski, A.4
-
58
-
-
0034836394
-
Intrusion detection via static analysis
-
Oakland, CA, USA, May 2001
-
D. Wagner, D. Dean, Intrusion detection via static analysis, in: Proceedings of the 2001 IEEE Symposium on Security and Privacy, Oakland, CA, USA, May 2001, pp. 156-168.
-
Proceedings of the 2001 IEEE Symposium on Security and Privacy
, pp. 156-168
-
-
Wagner, D.1
Dean, D.2
-
59
-
-
0038011184
-
Mimicry attacks on host-based intrusion detection systems
-
Washington, DC, USA, November 2002
-
D. Wagner, P. Soto, Mimicry attacks on host-based intrusion detection systems, in: Proceedings of the 9th ACM Conference on Computer and Communications Security, Washington, DC, USA, November 2002, pp. 255-264.
-
Proceedings of the 9th ACM Conference on Computer and Communications Security
, pp. 255-264
-
-
Wagner, D.1
Soto, P.2
-
60
-
-
35048832288
-
Context sensitive anomaly monitoring of process control flow to detect mimicry attacks and impossible paths
-
Sophia Antipolis, France, September 2004
-
H. Xu, W. Du, S. Chapin, Context sensitive anomaly monitoring of process control flow to detect mimicry attacks and impossible paths, in: Proceedings of the 7th International Symposium on Recent Advances in Intrusion Detection (RAID '04), Sophia Antipolis, France, September 2004, pp. 21-38.
-
Proceedings of the 7th International Symposium on Recent Advances in Intrusion Detection (RAID '04)
, pp. 21-38
-
-
Xu, H.1
Du, W.2
Chapin, S.3
-
61
-
-
77950788046
-
Panorama: Capturing system-wide information flow for malware detection and analysis
-
VA, November 2007
-
H. Yin, D. Song, M. Egele, C. Kruegel, E. Kirda, Panorama: capturing system-wide information flow for malware detection and analysis, The 14th ACM conference on Computer and Communications Security (CCS '07), VA, November 2007, pp. 116-127.
-
The 14th ACM Conference on Computer and Communications Security (CCS '07)
, pp. 116-127
-
-
Yin, H.1
Song, D.2
Egele, M.3
Kruegel, C.4
Kirda, E.5
|