-
3
-
-
85180622908
-
-
[AL] Alexa
-
[AL] Alexa, http://www.alexa.com/.
-
-
-
-
4
-
-
59249106693
-
Detecting Targeted Attacks Using Shadow Honeypots
-
[ASA+05] in August
-
[ASA+05] K. Anagnostakisy, S. Sidiroglouz, P. Akritidis, K. Xinidis, E. Markatos, and A. Keromytis. “Detecting Targeted Attacks Using Shadow Honeypots,” in Proc. USENIX Security Symposium, August 2005.
-
(2005)
Proc. USENIX Security Symposium
-
-
Anagnostakisy, K.1
Sidiroglouz, S.2
Akritidis, P.3
Xinidis, K.4
Markatos, E.5
Keromytis, A.6
-
6
-
-
85180624968
-
-
[B04] Nov
-
[B04] Xpire.info, http://www.vitalsecurity.org/xpiresplitinfinity-serverhack_malwareinstall-condensed.pdf, Nov. 2004.
-
(2004)
Xpire.info
-
-
-
8
-
-
15944423522
-
UML Extensions for Honeypots in the ISTS Distributed Honeypot Project
-
[CDF+04] in
-
[CDF+04] C. Carella, J. Dike, N. Fox, and M. Ryan, “UML Extensions for Honeypots in the ISTS Distributed Honeypot Project,” in Proc. IEEE Workshop on Information Assurance, 2004.
-
(2004)
Proc. IEEE Workshop on Information Assurance
-
-
Carella, C.1
Dike, J.2
Fox, N.3
Ryan, M.4
-
9
-
-
85180633383
-
-
[CWS05] TechWeb, March 30
-
[CWS05] “Webroot: CoolWebSearch Top Spyware Threat,” http://www.techweb.com/showArticle.jhtml?articleID=16040 0314, TechWeb, March 30, 2005.
-
(2005)
Webroot: CoolWebSearch Top Spyware Threat
-
-
-
10
-
-
85180637440
-
-
[D04] June
-
[D04] Download.Ject, http://www.microsoft.com/security/incident/download_ject.ms px, June 2004.
-
(2004)
Download.Ject
-
-
-
13
-
-
0029716418
-
A sense of self for Unix processes
-
[FHS+96] in May
-
[FHS+96] S. Forrest, S. Hofmeyr, A. Somayaji, and T. Longsta, “A sense of self for Unix processes,” in Proc. IEEE Symp. on Security and Privacy, May 1996.
-
(1996)
Proc. IEEE Symp. on Security and Privacy
-
-
Forrest, S.1
Hofmeyr, S.2
Somayaji, A.3
Longsta, T.4
-
14
-
-
70349100099
-
Anomaly detection using call stack information
-
[FKF+03] in May
-
[FKF+03] H. Feng, O. Kolesnikov, P. Fogla, W. Lee, and W. Gong, “Anomaly detection using call stack information,” in Proc. IEEE Symp. on Security and Privacy, May 2003.
-
(2003)
Proc. IEEE Symp. on Security and Privacy
-
-
Feng, H.1
Kolesnikov, O.2
Fogla, P.3
Lee, W.4
Gong, W.5
-
16
-
-
4544280267
-
Why PCs Are Fragile and What We Can Do About It: A Study of Windows Registry Problems
-
[G04] in June
-
[G04] Archana Ganapathi, Yi-Min Wang, Ni Lao, and Ji-Rong Wen, "Why PCs Are Fragile and What We Can Do About It: A Study of Windows Registry Problems", in Proc. IEEE DSN/DCC, June 2004.
-
(2004)
Proc. IEEE DSN/DCC
-
-
Ganapathi, Archana1
Wang, Yi-Min2
Lao, Ni3
Wen, Ji-Rong4
-
19
-
-
85180623003
-
Another round of DNS cache poisoning
-
[HD05] March 30
-
[HD05] “Another round of DNS cache poisoning,” Handlers Diary, March 30, 2005, http://isc.sans.org/.
-
(2005)
Handlers Diary
-
-
-
24
-
-
85180627944
-
-
[ISP]
-
[ISP] ISP Ranking by Subscriber, http://www.ispplanet.com/research/rankings/index.html.
-
ISP Ranking by Subscriber
-
-
-
25
-
-
85180637318
-
-
[IW05] InfoWorld.com, March 7
-
[IW05] “Scammers use Symantec, DNS holes to push adware,” InfoWorld.com, March 7, 2005, http://www.infoworld.com/article/05/03/07/HNsymantecholesandadware_1.html?DESKTOP%20SECURITY.
-
(2005)
Scammers use Symantec, DNS holes to push adware
-
-
-
26
-
-
85084164812
-
Collapsar: A VM-Based Architecture for Network Attack Detention Center
-
[J04] in Aug
-
[J04] Xuxian Jiang, Dongyan Xu, “Collapsar: A VM-Based Architecture for Network Attack Detention Center”, in Proc. USENIX Security Symposium, Aug. 2004.
-
(2004)
Proc. USENIX Security Symposium
-
-
Jiang, Xuxian1
Xu, Dongyan2
-
29
-
-
84885639914
-
Detecting Past and Present Intrusions Through Vulnerability-Specific Predicates
-
[JKD+05] in
-
[JKD+05] Ashlesha Joshi, Sam King, George Dunlap, Peter Chen, “Detecting Past and Present Intrusions Through Vulnerability-Specific Predicates,” in Proc. SOSP, 2005.
-
(2005)
Proc. SOSP
-
-
Joshi, Ashlesha1
King, Sam2
Dunlap, George3
Chen, Peter4
-
30
-
-
33645756878
-
The Use of Honeynets to Increase Computer Network Security and User Awareness
-
[KGO+05] in March
-
[KGO+05] Sven Krasser, Julian Grizzard, Henry Owen, and John Levine, “The Use of Honeynets to Increase Computer Network Security and User Awareness”, in Journal of Security Education, pp. 23-37, vol. 1, no. 2/3. March 2005.
-
(2005)
Journal of Security Education
, vol.1
, Issue.2/3
, pp. 23-37
-
-
Krasser, Sven1
Grizzard, Julian2
Owen, Henry3
Levine, John4
-
35
-
-
2342615538
-
Anti-honeypot technology
-
[NK04] Jan.-Feb. Page(s)
-
[NK04] Neal Krawetz, Anti-honeypot technology, Security & Privacy Magazine, IEEE Volume 2, Issue 1, Jan.-Feb. 2004 Page(s):76–79.
-
(2004)
Security & Privacy Magazine, IEEE
, vol.2
, Issue.1
, pp. 76-79
-
-
Krawetz, Neal1
-
39
-
-
84896264057
-
-
November
-
[R04] Team Register, “Bofra exploit hits our ad serving supplier,” http://www.theregister.co.uk/2004/11/21/register_adserver_attack/, November 2004.
-
(2004)
Bofra exploit hits our ad serving supplier
-
-
-
40
-
-
33750543292
-
-
[RP]
-
[RP] Red Pill, http://invisiblethings.org/papers/redpill.html.
-
Red Pill
-
-
-
43
-
-
85180629518
-
-
[SH] Aug
-
[SH] “What is Strider HoneyMonkey,” http://research.microsoft.com/honeymonkey/article.aspx, Aug. 2005.
-
(2005)
What is Strider HoneyMonkey
-
-
-
47
-
-
84885575254
-
Scalability, Fidelity and Containment in the Potemkin Virtual Honeyfarm
-
[VMC+05] in Oct
-
[VMC+05] Michael Vrable, Justin Ma, Jay Chen, David Moore, Erik Vandekieft, Alex Snoeren, Geoff Voelker, and Stefan Savage, “Scalability, Fidelity and Containment in the Potemkin Virtual Honeyfarm,” in Proc. ACM Symposium on Operating Systems Principles (SOSP), Oct. 2005.
-
(2005)
Proc. ACM Symposium on Operating Systems Principles (SOSP)
-
-
Vrable, Michael1
Ma, Justin2
Chen, Jay3
Moore, David4
Vandekieft, Erik5
Snoeren, Alex6
Voelker, Geoff7
Savage, Stefan8
-
49
-
-
85180624152
-
-
[VT] Vanderpool Technology, Technical report, Intel Corporation
-
[VT] Vanderpool Technology, Technical report, Intel Corporation, 2005.
-
(2005)
-
-
-
50
-
-
4544350077
-
STRIDER: A Black-box, State-based Approach to Change and Configuration Management and Support
-
[W03] in Oct
-
[W03] Yi-Min Wang, et al., “STRIDER: A Black-box, State-based Approach to Change and Configuration Management and Support”, in Proc. Usenix LISA, Oct. 2003.
-
(2003)
Proc. Usenix LISA
-
-
Wang, Yi-Min1
-
51
-
-
33750584355
-
Gatekeeper: Monitoring Auto-Start Extensibility Points (ASEPs) for Spyware Management
-
[W04] in
-
[W04] Yi-Min Wang, et al., “Gatekeeper: Monitoring Auto-Start Extensibility Points (ASEPs) for Spyware Management”, in Proc. Usenix LISA, 2004
-
(2004)
Proc. Usenix LISA
-
-
Wang, Yi-Min1
-
52
-
-
27544461178
-
Detecting Stealth Software with Strider GhostBuster
-
[W05] in June
-
[W05] Yi-Min Wang, Doug Beck, Binh Vo, Roussi Roussev, and Chad Verbowski, “Detecting Stealth Software with Strider GhostBuster,” in Proc. DSN, June 2005
-
(2005)
Proc. DSN
-
-
Wang, Yi-Min1
Beck, Doug2
Vo, Binh3
Roussev, Roussi4
Verbowski, Chad5
-
53
-
-
27544510809
-
Shield: Vulnerability-Driven Network Filters for Preventing Known Vulnerability Exploits
-
[WGS+04] in August
-
[WGS+04] Helen J. Wang, Chuanxiong Guo, Daniel R. Simon, and Alf Zugenmaier, “Shield: Vulnerability-Driven Network Filters for Preventing Known Vulnerability Exploits,” in Proc. ACM SIGCOMM, August 2004.
-
(2004)
Proc. ACM SIGCOMM
-
-
Wang, Helen J.1
Guo, Chuanxiong2
Simon, Daniel R.3
Zugenmaier, Alf4
-
55
-
-
85180626569
-
-
[XSS] March 28
-
[XSS] “Code insertion in Blogger comments”, March 28, 2005, http://www.securityfocus.com/archive/1/394532.
-
(2005)
Code insertion in Blogger comments
-
-
|