-
8
-
-
76949094440
-
-
Winamp3 buffer overflow. http://www.securityspace.com/ smysecure/catid.html?id=11530.
-
Winamp3 Buffer Overflow
-
-
-
9
-
-
76949088597
-
-
November
-
Pax documentation. http://pax.grsecurity.net/docs/pax.txt, November 2003.
-
(2003)
Pax Documentation
-
-
-
11
-
-
18744376889
-
Randomized instruction set emulation to disrupt binary code injection attacks
-
October
-
BARRANTES, E., ACKLEY, D., PALMER, T., STEFANOVIC, D., AND ZOVI, D. Randomized instruction set emulation to disrupt binary code injection attacks. In Proceedings of the 10th ACM conference on Computer and communications security (October 2003).
-
(2003)
Proceedings of the 10th ACM Conference on Computer and Communications Security
-
-
Barrantes, E.1
Ackley, D.2
Palmer, T.3
Stefanovic, D.4
Zovi, D.5
-
12
-
-
76949100713
-
-
BERNERS-LEE, T., MASINTER, L., AND MCCAHILL, M. Uniform Resource Locators (URL). RFC 1738 (Proposed Standard). Updated by RFCs 1808, 2368, 2396, 3986.
-
Uniform Resource Locators (URL). RFC 1738 (Proposed Standard). Updated by RFCs 1808, 2368, 2396, 3986
-
-
Berners-Lee, T.1
Masinter, L.2
McCahill, M.3
-
13
-
-
84954188728
-
Efficient techniques for comprehensive protection from memory error exploits
-
BHATKAR, S., SEKAR, R., AND DUVARNEY, D. C. Efficient techniques for comprehensive protection from memory error exploits. In USENIX Security (2005).
-
(2005)
USENIX Security
-
-
Bhatkar, S.1
Sekar, R.2
Duvarney, D.C.3
-
14
-
-
25644452721
-
Model checking one million lines of c code
-
CHEN, H., DEAN, D., AND WAGNER, D. Model checking one million lines of c code. In NDSS (2004).
-
(2004)
NDSS
-
-
Chen, H.1
Dean, D.2
Wagner, D.3
-
15
-
-
33746405183
-
A fast static analysis approach to detect exploit code inside network flows
-
CHINCHANI, R., AND BERG, E. V. D. A fast static analysis approach to detect exploit code inside network flows. In RAID (2005).
-
(2005)
RAID
-
-
Chinchani, R.1
Berg, E.V.D.2
-
17
-
-
27544433210
-
Semantics-aware malware detection
-
Oakland May
-
CHRISTODORESCU, M., JHA, S., SESHIA, S. A., SONG, D., AND BRYANT, R. E. Semantics-aware malware detection. In IEEE Symposium on Security and Privacy, Oakland (May 2005).
-
(2005)
IEEE Symposium on Security and Privacy
-
-
Christodorescu, M.1
Jha, S.2
Seshia, S.A.3
Song, D.4
Bryant, R.E.5
-
18
-
-
0035017559
-
RAD: A compile-time solution to buffer overflow attacks
-
CKER CHIUEH, T., AND HSU, F.-H. Rad: A compile-time solution to buffer overflow attacks. In ICDCS (2001).
-
(2001)
ICDCS
-
-
Cker Chiueh, T.1
Hsu, F.-H.2
-
19
-
-
0004046658
-
-
Tech. Rep. 148, Department of Computer Science,University of Auckland, July
-
COLLBERG, C., THOMBORSON, C., AND LOW, D. A taxonomy of obfuscating transformations. Tech. Rep. 148, Department of Computer Science,University of Auckland, July 1997.
-
(1997)
A Taxonomy of Obfuscating Transformations
-
-
Collberg, C.1
Thomborson, C.2
Low, D.3
-
21
-
-
84885679117
-
Vigilante: End-to-end containment of internet worms
-
COSTA, M., CROWCROFT, J., CASTRO, M., ROWSTRON, A., ZHOU, L., ZHANG, L., AND BARHAM, P. Vigilante: End-to-end containment of internet worms. In SOSP (2005).
-
(2005)
SOSP
-
-
Costa, M.1
Crowcroft, J.2
Castro, M.3
Rowstron, A.4
Zhou, L.5
Zhang, L.6
Barham, P.7
-
22
-
-
85084160243
-
StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks
-
January
-
COWAN, C., PU, C., MAIER, D., HINTON, H., WALPOLE, J., BAKKE, P., BEATTIE, S., GRIER, A., WAGLE, P., AND ZHANG, Q. Stackguard: Automatic adaptive detection and prevention of buffer-overflow attacks. In Proceedings of 7th USENIX Security Conference (January 1998).
-
(1998)
Proceedings of 7th USENIX Security Conference
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Hinton, H.4
Walpole, J.5
Bakke, P.6
Beattie, S.7
Grier, A.8
Wagle, P.9
Zhang, Q.10
-
23
-
-
27544481859
-
-
DETRISTAN, T., ULENSPIEGEL, T., MALCOM, Y., AND UNDERDUK, M. S. V. Polymorphic shellcode engine using spectrum analysis. http://www.phrack.org/show.php?p=61&a=9.
-
Polymorphic Shellcode Engine Using Spectrum Analysis
-
-
Detristan, T.1
Ulenspiegel, T.2
Malcom, Y.3
Underduk, M.S.V.4
-
24
-
-
0036147522
-
Improving security using extensible lightweight static analysis
-
EVANS, D., AND LAROCHELLE, D. Improving security using extensible lightweight static analysis. IEEE Software 19, 1 (2002).
-
(2002)
IEEE Software
, vol.19
, pp. 1
-
-
Evans, D.1
Larochelle, D.2
-
25
-
-
0016996537
-
Data flow analysis in software reliability
-
September
-
FOSDICK, L. D., AND OSTERWEIL, L. Data flow analysis in software reliability. ACM Computing Surveys 8 (September 1976).
-
(1976)
ACM Computing Surveys
, vol.8
-
-
Fosdick, L.D.1
Osterweil, L.2
-
26
-
-
0018467375
-
Detection of data flow anomaly through program instrumentation
-
May
-
HUANG, J. Detection of data flow anomaly through program instrumentation. IEEE Transactions on Software Engineering 5, 3 (May 1979).
-
(1979)
IEEE Transactions on Software Engineering
, vol.5
, pp. 3
-
-
Huang, J.1
-
27
-
-
3543096392
-
Fast portscan detection using sequential hypothesis testing
-
JUNG, J., PAXSON, V., BERGER, A., AND BALAKRISHNAN, H. Fast portscan detection using sequential hypothesis testing. In Proc. IEEE Symposium on Security and Privacy (2004).
-
(2004)
Proc. IEEE Symposium on Security and Privacy
-
-
Jung, J.1
Paxson, V.2
Berger, A.3
Balakrishnan, H.4
-
32
-
-
33746389292
-
Polymorphic worm detection using structural information of executables
-
KRUEGEL, C., KIRDA, E., MUTZ, D., ROBERTSON, W., AND VIGNA, G. Polymorphic worm detection using structural information of executables. In RAID (2005).
-
(2005)
RAID
-
-
Kruegel, C.1
Kirda, E.2
Mutz, D.3
Robertson, W.4
Vigna, G.5
-
33
-
-
85084160818
-
Static disassembly of obfuscated binaries
-
August
-
KRUEGEL, C., ROBERTSON, W., VALEUR, F., AND VIGNA, G. Static disassembly of obfuscated binaries. In Proceedings of USENIX Security 2004 (August 2004).
-
(2004)
Proceedings of USENIX Security 2004
-
-
Kruegel, C.1
Robertson, W.2
Valeur, F.3
Vigna, G.4
-
34
-
-
33745220279
-
Detecting and prevention of stack buffer overflow attacks
-
KUPERMAN, B. A., BRODLEY, C. E., OZDOGANOGLU, H., VIJAYKUMAR, T. N., AND JALOTE, A. Detecting and prevention of stack buffer overflow attacks. Communications of the ACM 48, 11 (2005).
-
(2005)
Communications of the ACM
, vol.48
, pp. 11
-
-
Kuperman, B.A.1
Brodley, C.E.2
Ozdoganoglu, H.3
Vijaykumar, T.N.4
Jalote, A.5
-
39
-
-
33750951962
-
Flips: Hybrid adaptive intrusion prevention
-
LOCASTO, M. E., WANG, K., KEROMYTIS, A. D., AND STOLFO, S. J. Flips: Hybrid adaptive intrusion prevention. In RAID (2005).
-
(2005)
RAID
-
-
Locasto, M.E.1
Wang, K.2
Keromytis, A.D.3
Stolfo, S.J.4
-
41
-
-
50249180640
-
A processor architecture defense against buffer overflow attacks
-
MCGREGOR, J., KARIG, D., SHI, Z., AND LEE, R. A processor architecture defense against buffer overflow attacks. In Proceedings of International Conference on Information Technology: Research and Education (ITRE) (2003), pp. 243 – 250.
-
(2003)
Proceedings of International Conference on Information Technology: Research and Education (ITRE)
, pp. 243-250
-
-
McGregor, J.1
Karig, D.2
Shi, Z.3
Lee, R.4
-
43
-
-
79953672829
-
Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
-
NEWSOME, J., AND SONG, D. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In NDSS (2005).
-
(2005)
NDSS
-
-
Newsome, J.1
Song, D.2
-
44
-
-
14944369649
-
Characteristics of internet background radiation
-
PANG, R., YEGNESWARAN, V., BARFORD, P., PAXSON, V., AND PETERSON, L. Characteristics of internet background radiation. In Proc. ACM IMC (2004).
-
(2004)
Proc. ACM IMC
-
-
Pang, R.1
Yegneswaran, V.2
Barford, P.3
Paxson, V.4
Peterson, L.5
-
47
-
-
14844309952
-
-
Tech. rep., University of California at San Diego
-
SINGH, S., ESTAN, C., VARGHESE, G., AND SAVAGE, S. The earlybird system for real-time detection of unknown worms. Tech. rep., University of California at San Diego, 2003.
-
(2003)
The Earlybird System for Real-Time Detection of Unknown Worms
-
-
Singh, S.1
Estan, C.2
Varghese, G.3
Savage, S.4
-
49
-
-
33845453072
-
Dira: Automatic detection, identification, and repair of control-hijacking attacks
-
SMIRNOV, A., AND CKER CHIUEH, T. Dira: Automatic detection, identification, and repair of control-hijacking attacks. In NDSS (2005).
-
(2005)
NDSS
-
-
Smirnov, A.1
Cker Chiueh, T.2
-
50
-
-
1642268792
-
Accurate buffer overflow detection via abstract payload execution
-
TOTH, T., AND KRUEGEL, C. Accurate buffer overflow detection via abstract payload execution. In RAID (2002).
-
(2002)
RAID
-
-
Toth, T.1
Kruegel, C.2
-
51
-
-
85081874807
-
A first step towards automated detection of buffer overrun vulnerabilities
-
February
-
WAGNER, D., FOSTER, J. S., BREWER, E. A., AND AIKEN, A. A first step towards automated detection of buffer overrun vulnerabilities. In Network and Distributed System Security Symposium (February 2000).
-
(2000)
Network and Distributed System Security Symposium
-
-
Wagner, D.1
Foster, J.S.2
Brewer, E.A.3
Aiken, A.4
-
52
-
-
27544510809
-
Shield: Vulnerability-driven network filters for preventing known vulnerability exploits
-
August
-
WANG, H. J., GUO, C., SIMON, D. R., AND ZUGENMAIER, A. Shield: Vulnerability-driven network filters for preventing known vulnerability exploits. In Proceedings of the ACM SIGCOMM Conference (August 2004).
-
(2004)
Proceedings of the ACM SIGCOMM Conference
-
-
Wang, H.J.1
Guo, C.2
Simon, D.R.3
Zugenmaier, A.4
-
53
-
-
33750351545
-
Anomalous payload-based worm detection and signature generation
-
WANG, K.,, CRETU, G., AND STOLFO, S. J. Anomalous payload-based worm detection and signature generation. In RAID (2005).
-
(2005)
RAID
-
-
Wang, K.1
Cretu, G.2
Stolfo, S.J.3
-
54
-
-
30344438592
-
Anomalous payload-based network instrusion detection
-
WANG, K., AND STOLFO, S. J. Anomalous payload-based network instrusion detection. In RAID (2004).
-
(2004)
RAID
-
-
Wang, K.1
Stolfo, S.J.2
-
55
-
-
33745803872
-
Automatic diagnosis and response to memory corruption vulnerabilities
-
XU, J., NING, P., KIL, C., ZHAI, Y., AND BOOKHOLT, C. Automatic diagnosis and response to memory corruption vulnerabilities. In Proc. 12th ACM Conference on Computer and Communications Security (2005).
-
(2005)
Proc. 12th ACM Conference on Computer and Communications Security
-
-
Xu, J.1
Ning, P.2
Kil, C.3
Zhai, Y.4
Bookholt, C.5
|