-
1
-
-
4344622709
-
Runtime process infection
-
Anonymous. ar-ticle 8 of 18, December
-
Anonymous. Runtime process infection. Phrack, 11(59):ar-ticle 8 of 18, December 2002.
-
(2002)
Phrack
, vol.11
, Issue.59
-
-
-
2
-
-
85180530043
-
Interface promiscuity obscurity
-
Apk. article 10 of 15, July
-
Apk. Interface promiscuity obscurity. Phrack, 8(53):article 10 of 15, July 1998.
-
(1998)
Phrack
, vol.8
, Issue.53
-
-
-
10
-
-
84978401615
-
Revirt: Enabling intrusion analysis through virtual-machine logging and replay
-
December
-
G. W. Dunlap, S. T. King, S. Cinar, M. Basrai, and P. M. Chen. Revirt: Enabling intrusion analysis through virtual-machine logging and replay. In Proc. of 2002 Symposium on Operating Systems Design and Implementation (OSDI), December 2002.
-
(2002)
Proc. of 2002 Symposium on Operating Systems Design and Implementation (OSDI)
-
-
Dunlap, G. W.1
King, S. T.2
Cinar, S.3
Basrai, M.4
Chen, P. M.5
-
12
-
-
85072542009
-
A security retrofit for VM/370
-
pages June
-
B. Gold, R. Linde, R. J. Peller, M. Schaefer, J. Scheid, and P. D. Ward. A security retrofit for VM/370. In AFIPS National Computer Conference, volume 48, pages 335–344, June 1979.
-
(1979)
AFIPS National Computer Conference
, vol.48
, pp. 335-344
-
-
Gold, B.1
Linde, R.2
Peller, R. J.3
Schaefer, M.4
Scheid, J.5
Ward, P. D.6
-
14
-
-
84855544565
-
VM/370 security retrofit program
-
October
-
B. Gold, R. R. Linde, M. Schaefer, and J. F. Scheid. VM/370 security retrofit program. In Proc. ACM Annual Conference, pages 411–418, October 1977.
-
(1977)
Proc. ACM Annual Conference
, pp. 411-418
-
-
Gold, B.1
Linde, R. R.2
Schaefer, M.3
Scheid, J. F.4
-
16
-
-
84926427148
-
Survey of virtual machine research
-
June
-
R. Goldberg. Survey of virtual machine research. IEEE Computer Magazine, 7:34–45, June 1974.
-
(1974)
IEEE Computer Magazine
, vol.7
, pp. 34-45
-
-
Goldberg, R.1
-
18
-
-
85180538577
-
Bypassing integrity checking systems
-
halflife. article 9 of 17, September
-
halflife. Bypassing integrity checking systems. Phrack, 7(51):article 9 of 17, September 1997.
-
(1997)
Phrack
, vol.7
, Issue.51
-
-
-
19
-
-
0032313923
-
Intrusion detection using sequences of system calls
-
S. A. Hofmeyr, S. Forrest, and A. Somayaji. Intrusion detection using sequences of system calls. Journal of Computer Security, 6(3):151–180, 1998.
-
(1998)
Journal of Computer Security
, vol.6
, Issue.3
, pp. 151-180
-
-
Hofmeyr, S. A.1
Forrest, S.2
Somayaji, A.3
-
20
-
-
0034449536
-
Implementing a distributed firewall
-
S. Ioannidis, A. D. Keromytis, S. M. Bellovin, and J. M. Smith. Implementing a distributed firewall. In ACM Conference on Computer and Communications Security, pages 190–199, 2000.
-
(2000)
ACM Conference on Computer and Communications Security
, pp. 190-199
-
-
Ioannidis, S.1
Keromytis, A. D.2
Bellovin, S. M.3
Smith, J. M.4
-
21
-
-
85180535053
-
-
Nov
-
P. Karger, M. Zurko, D. Bonin, A. Mason, and C. Kahn. A retrospective on the VAX VMM security kernel. 17(11), Nov. 1991.
-
(1991)
A retrospective on the VAX VMM security kernel
, vol.17
, Issue.11
-
-
Karger, P.1
Zurko, M.2
Bonin, D.3
Mason, A.4
Kahn, C.5
-
23
-
-
84930451551
-
Backdooring binary objects
-
klog. article 9 of 16, May
-
klog. Backdooring binary objects. Phrack, 10(56):article 9 of 16, May 2000.
-
(2000)
Phrack
, vol.10
, Issue.56
-
-
-
25
-
-
85180538819
-
Building into the linux network layer
-
article July
-
l. kossack. Building into the linux network layer. Phrack, 9(55):article 12 of 19, July 1999.
-
(1999)
Phrack
, vol.9
, Issue.55
, pp. 12of19
-
-
kossack, l.1
-
27
-
-
85180530575
-
-
lrk5.src.tar.gz
-
Lord Somer. lrk5.src.tar.gz, Linux rootkit V. http://packetstorm.decepticons.org.
-
Linux rootkit V
-
-
Somer, Lord1
-
30
-
-
85180532809
-
-
Mission Critical Linux. Core Analysis Suite v3.3. http://oss.missioncriticallinux.com/projects/crash/.
-
Core Analysis Suite v3.3
-
-
-
32
-
-
85180533893
-
Advances in kernel hacking
-
arti-cle 6 of 15, December
-
palmers. Advances in kernel hacking. Phrack, 11(58):arti-cle 6 of 15, December 2001.
-
(2001)
Phrack
, vol.11
, Issue.58
-
-
-
33
-
-
0033295259
-
Bro: a system for detecting network intruders in real-time
-
V. Paxson. Bro: a system for detecting network intruders in real-time. Computer Networks, 31(23-24):2435–2463, 1999.
-
(1999)
Computer Networks
, vol.31
, Issue.23-24
, pp. 2435-2463
-
-
Paxson, V.1
-
35
-
-
0004145058
-
-
Technical report, Suite 330, 1201 5th Street S.W, Calgary, Alberta, Canada, T2R-0Y6
-
T. H. Ptacek and T. N. Newsham. Insertion, evasion, and denial of service: Eluding network intrusion detection. Technical report, Suite 330, 1201 5th Street S.W, Calgary, Alberta, Canada, T2R-0Y6, 1998.
-
(1998)
Insertion, evasion, and denial of service: Eluding network intrusion detection
-
-
Ptacek, T. H.1
Newsham, T. N.2
-
38
-
-
0030653560
-
Using the simos machine simulator to study complex computer systems
-
M. Rosenblum, E. Bugnion, S. Devine, and S. A. Her-rod. Using the simos machine simulator to study complex computer systems. Modeling and Computer Simulation, 7(1):78–103, 1997.
-
(1997)
Modeling and Computer Simulation
, vol.7
, Issue.1
, pp. 78-103
-
-
Rosenblum, M.1
Bugnion, E.2
Devine, S.3
Her-rod, S. A.4
-
40
-
-
84872311782
-
Linux on-the-fly kernel patching without lkm
-
sd. article 7 of 15, December
-
sd. Linux on-the-fly kernel patching without lkm. Phrack, 11(58):article 7 of 15, December 2001.
-
(2001)
Phrack
, vol.11
, Issue.58
-
-
-
45
-
-
85084164828
-
Virtualizing I/O devices on VMware workstation’s hosted virtual machine monitor
-
Boston, MA, USA, June
-
J. Sugerman, G. Venkitachalam, and B. Lim. Virtualizing I/O devices on VMware workstation’s hosted virtual machine monitor. In Proceedings of the 2001 Annual Usenix Technical Conference, Boston, MA, USA, June 2001.
-
(2001)
Proceedings of the 2001 Annual Usenix Technical Conference
-
-
Sugerman, J.1
Venkitachalam, G.2
Lim, B.3
-
52
-
-
84944248021
-
Intrusion detection using variable length audit trail patterns
-
A. Wespi, M. Dacier, and H. Debar. Intrusion detection using variable length audit trail patterns. In RAID 2000, pages 110–129, 2000.
-
(2000)
RAID 2000
, pp. 110-129
-
-
Wespi, A.1
Dacier, M.2
Debar, H.3
|