-
7
-
-
85084160243
-
Stackguard: Automatic adaptive detection and prevention of buffer-overflow attacks
-
January
-
C. Cowan, C. Pu, D. Maier, H. Hinton, J. Walpole, P. Bakke, S. Beattie, A. Grier, P. Wagle, and Q. Zhang. Stackguard: Automatic adaptive detection and prevention of buffer-overflow attacks. In Proceedings of the USENIX Security Symposium, January 1998.
-
(1998)
Proceedings of the USENIX Security Symposium
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Hinton, H.4
Walpole, J.5
Bakke, P.6
Beattie, S.7
Grier, A.8
Wagle, P.9
Zhang, Q.10
-
8
-
-
78751539789
-
Heap Taichi: Exploiting memory allocation granularity in heapspraying attacks
-
Y. Ding, T. Wei, T. Wang, Z. Liang, and W. Zou. Heap Taichi: Exploiting memory allocation granularity in heapspraying attacks. In Proceedings of Annual Computer Security Applications Conference, 2010.
-
(2010)
Proceedings of Annual Computer Security Applications Conference
-
-
Ding, Y.1
Wei, T.2
Wang, T.3
Liang, Z.4
Zou, W.5
-
9
-
-
84869772992
-
Defending browsers against drive-by downloads: Mitigating heap-spraying code injection attacks
-
M. Egele, P. Wurzinger, C. Krügel, and E. Kirda. Defending browsers against drive-by downloads: Mitigating heap-spraying code injection attacks. In Proceedings of the Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, 2009.
-
(2009)
Proceedings of the Conference on Detection of Intrusions and Malware, and Vulnerability Assessment
-
-
Egele, M.1
Wurzinger, P.2
Krügel, C.3
Kirda, E.4
-
10
-
-
77954525433
-
Caffeine Monkey: Automated collection, detection and analysis of malicious JavaScript
-
B. Feinstein and D. Peck. Caffeine Monkey: Automated collection, detection and analysis of malicious JavaScript. In Proceedings of Black Hat USA, 2007.
-
(2007)
Proceedings of Black Hat USA
-
-
Feinstein, B.1
Peck, D.2
-
14
-
-
84868376459
-
-
Technical Report MSR-TR-2010-100, Microsoft Research
-
S. Karanth, S. Laxman, P. Naldurg, R. Venkatesan, J. Lambert, and J. Shin. Pattern mining for future attacks. Technical Report MSR-TR-2010-100, Microsoft Research, 2010.
-
(2010)
Pattern Mining for Future Attacks
-
-
Karanth, S.1
Laxman, S.2
Naldurg, P.3
Venkatesan, R.4
Lambert, J.5
Shin, J.6
-
19
-
-
85076460742
-
-
Praetorian Prefect, Jan.
-
Praetorian Prefect. The "aurora" IE exploit used against Google in action. http: //praetorianprefect.com/archives/2010/01/ the-aurora-ie-exploit-in-action/, Jan. 2010.
-
(2010)
The "Aurora" IE Exploit Used against Google in Action
-
-
-
30
-
-
70449497037
-
-
K. Wang. HoneyClient. http://www.honeyclient. org/trac, 2005.
-
(2005)
HoneyClient
-
-
Wang, K.1
-
31
-
-
33750356750
-
Automated web patrol with Strider HoneyMonkeys: Finding web sites that exploit browser vulnerabilities
-
Y.-M. Wang, D. Beck, X. Jiang, R. Roussev, C. Verbowski, S. Chen, and S. King. Automated web patrol with Strider HoneyMonkeys: Finding web sites that exploit browser vulnerabilities. In Proceedings of the Network and Distributed System Security Symposium, 2006.
-
(2006)
Proceedings of the Network and Distributed System Security Symposium
-
-
Wang, Y.-M.1
Beck, D.2
Jiang, X.3
Roussev, R.4
Verbowski, C.5
Chen, S.6
King, S.7
-
32
-
-
77950621688
-
-
Technical report, University of Mannheim
-
J. Zhuge, T. Holz, C. Song, J. Guo, X. Han, and W. Zou. Studying malicious websites and the underground economy on the Chinese web. Technical report, University of Mannheim, 2007.
-
(2007)
Studying Malicious Websites and the Underground Economy on the Chinese Web
-
-
Zhuge, J.1
Holz, T.2
Song, C.3
Guo, J.4
Han, X.5
Zou, W.6
|