-
3
-
-
27544433210
-
Semantics-aware malware detection
-
M. Christodorescu, S. Jha, S. Seshia, D. Song, and R. Bryant. Semantics-aware malware detection. In Proceeding of the IEEE Security and Privacy Conference, 2005.
-
(2005)
Proceeding of the IEEE Security and Privacy Conference
-
-
Christodorescu, M.1
Jha, S.2
Seshia, S.3
Song, D.4
Bryant, R.5
-
6
-
-
3543086916
-
Formalizing sensitivity in static analysis for intrusion detection
-
H. Feng, J. Giffin, Y. Huang, S. Jha, W. Lee, and B. Miller. Formalizing sensitivity in static analysis for intrusion detection. In Proceedings the IEEE Symposium on Security and Privacy, 2004.
-
(2004)
Proceedings the IEEE Symposium on Security and Privacy
-
-
Feng, H.1
Giffin, J.2
Huang, Y.3
Jha, S.4
Lee, W.5
Miller, B.6
-
7
-
-
70349100099
-
Anomaly detection using call stack information
-
H. Feng, O. Kolesnikov, P. Fogla, W. Lee, and W. Gong. Anomaly detection using call stack information. In Proceedings of the IEEE Security and Privacy Conference, 2003.
-
(2003)
Proceedings of the IEEE Security and Privacy Conference
-
-
Feng, H.1
Kolesnikov, O.2
Fogla, P.3
Lee, W.4
Gong, W.5
-
10
-
-
70249138620
-
-
Threat Intelligence Group. Phatbot trojan analysis. http://www.lurhq.com/phatbot.html.
-
Phatbot Trojan Analysis
-
-
-
11
-
-
85084160972
-
Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics
-
M. Handley and V. Paxson. Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics. In 10th USENIX Security Symposium, 2001.
-
(2001)
10th USENIX Security Symposium
-
-
Handley, M.1
Paxson, V.2
-
12
-
-
31844441673
-
-
Technical Report GIT-CC-04-13, College of Computing, Georgia Tech
-
O. M. Kolesnikov, D. Dagon, and W. Lee. Advanced polymorphic worms: Evading IDS by blending in with normal traffic. Technical Report GIT-CC-04-13, College of Computing, Georgia Tech, 2004.
-
(2004)
Advanced Polymorphic Worms: Evading IDS by Blending in with Normal Traffic
-
-
Kolesnikov, O.M.1
Dagon, D.2
Lee, W.3
-
13
-
-
85077528077
-
Automating mimicry attacks using static binary analysis
-
C. Kruegel, E. Kirda, D. Mutz, W. Robertson, and G. Vigna. Automating mimicry attacks using static binary analysis. In 14th Usenix Security Symposium, 2005.
-
(2005)
14th Usenix Security Symposium
-
-
Kruegel, C.1
Kirda, E.2
Mutz, D.3
Robertson, W.4
Vigna, G.5
-
14
-
-
33746389292
-
Polymorphic worm detection using structural information of executables
-
C. Kruegel, E. Kirda, D. Mutz, W. Robertson, and G. Vigna. Polymorphic worm detection using structural information of executables. In Recent Advances in Intrusion Detection, 2005.
-
(2005)
Recent Advances in Intrusion Detection
-
-
Kruegel, C.1
Kirda, E.2
Mutz, D.3
Robertson, W.4
Vigna, G.5
-
15
-
-
0036038437
-
Service specific anomaly detection for network intrusion detection
-
C. Kruegel, T. Toth, and E. Kirda. Service specific anomaly detection for network intrusion detection. In Proceedings of ACM SIGSAC, 2002.
-
(2002)
Proceedings of ACM SIGSAC
-
-
Kruegel, C.1
Toth, T.2
Kirda, E.3
-
16
-
-
14844319067
-
Anomaly detection of web-based attacks
-
C. Kruegel and G. Vigna. Anomaly detection of web-based attacks. In Proceedings of ACM CCS, pages 251–261, 2003.
-
(2003)
Proceedings of ACM CCS
, pp. 251-261
-
-
Kruegel, C.1
Vigna, G.2
-
18
-
-
0037661195
-
Network traffic anomaly detection based on packet bytes
-
M. Mahoney. Network traffic anomaly detection based on packet bytes. In Proceedings of ACM SIGSAC, 2003.
-
(2003)
Proceedings of ACM SIGSAC
-
-
Mahoney, M.1
-
19
-
-
0242456801
-
Learning nonstationary models of normal network traffic for detecting novel attacks
-
M. Mahoney and P.K. Chan. Learning nonstationary models of normal network traffic for detecting novel attacks. In Proceedings of SIGKDD, 2002.
-
(2002)
Proceedings of SIGKDD
-
-
Mahoney, M.1
Chan, P.K.2
-
21
-
-
33751051489
-
Misleading worm signature generators using deliberate noise injection
-
R. Perdisci, D. Dagon, W. Lee, P. Fogla, and M. Sharif. Misleading worm signature generators using deliberate noise injection. In Proceedings of the IEEE Security and Privacy Conference, 2006.
-
(2006)
Proceedings of the IEEE Security and Privacy Conference
-
-
Perdisci, R.1
Dagon, D.2
Lee, W.3
Fogla, P.4
Sharif, M.5
-
22
-
-
0004145058
-
-
Technical Report T2R-0Y6, Secure Networks, Inc
-
T.H. Ptacek and T.N. Newsham. Insertion, evasion, and denial of service: Eluding network intrusion detection. Technical Report T2R-0Y6, Secure Networks, Inc., 1998.
-
(1998)
Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection
-
-
Ptacek, T.H.1
Newsham, T.N.2
-
28
-
-
34547257114
-
Advanced code evolution techniques and computer virus generator kits
-
P. Szor. Advanced code evolution techniques and computer virus generator kits. The Art of Computer Virus Research and Defense, 2005.
-
(2005)
The Art of Computer Virus Research and Defense
-
-
Szor, P.1
|