-
2
-
-
85080608692
-
-
visited April
-
Rough auditing tool for security. Fortify Software Inc., https://www.fortify.com/ssa-elements/threat-intelligence/rats.html, visited April, 2011.
-
(2011)
Rough Auditing Tool for Security
-
-
-
4
-
-
38149089416
-
Automated classification and analysis of internet malware
-
M. Bailey, J. Oberheide, J. Andersen, Z. M. Mao, F. Jahanian, and J. Nazario. Automated Classification and Analysis of Internet Malware. In Recent Adances in Intrusion Detection (RAID), pages 178–197, 2007.
-
(2007)
Recent Adances in Intrusion Detection (RAID)
, pp. 178-197
-
-
Bailey, M.1
Oberheide, J.2
Andersen, J.3
Mao, Z.M.4
Jahanian, F.5
Nazario, J.6
-
5
-
-
85043201839
-
Scalable, behavior-based malware clustering
-
U. Bayer, P. Comparetti, C. Hlauschek, C. Kruegel, and E. Kirda. Scalable, behavior-based malware clustering. In Proc. of Network and Distributed System Security Symposium (NDSS), 2009.
-
(2009)
Proc. of Network and Distributed System Security Symposium (NDSS)
-
-
Bayer, U.1
Comparetti, P.2
Hlauschek, C.3
Kruegel, C.4
Kirda, E.5
-
7
-
-
50249170401
-
Casting out demons: Sanitizing training data for anomaly sensors
-
G. Cretu, A. Stavrou, M. Locasto, S. Stolfo, and A. Keromytis. Casting out demons: Sanitizing training data for anomaly sensors. In Proc. of IEEE Symposium on Security and Privacy, 2008.
-
(2008)
Proc. of IEEE Symposium on Security and Privacy
-
-
Cretu, G.1
Stavrou, A.2
Locasto, M.3
Stolfo, S.4
Keromytis, A.5
-
8
-
-
84989525001
-
Indexing by latent semantic analysis
-
S. Deerwester, S. Dumais, G. Furnas, T. Landauer, and R. Harshman. Indexing by latent semantic analysis. Journal of the American society for information science, 41(6):391–407, 1990.
-
(1990)
Journal of the American Society for Information Science
, vol.41
, Issue.6
, pp. 391-407
-
-
Deerwester, S.1
Dumais, S.2
Furnas, G.3
Landauer, T.4
Harshman, R.5
-
10
-
-
0036041420
-
Bugs as deviant behavior: A general approach to inferring errors in systems code
-
D. Engler, D. Y. Chen, S. Hallem, A. Chou, and B. Chelf. Bugs as deviant behavior: A general approach to inferring errors in systems code. In Proc. of ACM Symposium on Operating Systems Principles (SOSP), pages 57–72, 2001.
-
(2001)
Proc. of ACM Symposium on Operating Systems Principles (SOSP)
, pp. 57-72
-
-
Engler, D.1
Chen, D.Y.2
Hallem, S.3
Chou, A.4
Chelf, B.5
-
12
-
-
0029716418
-
A sense of self for unix processes
-
Oakland, CA, USA
-
S. Forrest, S. Hofmeyr, A. Somayaji, and T. Longstaff. A sense of self for unix processes. In Proc. of IEEE Symposium on Security and Privacy, pages 120–128, Oakland, CA, USA, 1996.
-
(1996)
Proc. of IEEE Symposium on Security and Privacy
, pp. 120-128
-
-
Forrest, S.1
Hofmeyr, S.2
Somayaji, A.3
Longstaff, T.4
-
16
-
-
32344452883
-
PR-Miner: Automatically extracting implicit programming rules and detecting violations in large software code
-
Z. Li and Y. Zhou. PR-Miner: automatically extracting implicit programming rules and detecting violations in large software code. In Proc. of European Software Engineering Conference (ESEC), pages 306–315, 2005.
-
(2005)
Proc. of European Software Engineering Conference (ESEC)
, pp. 306-315
-
-
Li, Z.1
Zhou, Y.2
-
18
-
-
84923564816
-
Finding security vulnerabilities in java applications with static analysis
-
V. B. Livshits and M. S. Lam. Finding security vulnerabilities in java applications with static analysis. In Proc. of USENIX Security Symposium, 2005.
-
(2005)
Proc. of USENIX Security Symposium
-
-
Livshits, V.B.1
Lam, M.S.2
-
20
-
-
79953672829
-
Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
-
J. Newsome and D. Song. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In Proc. of Network and Distributed System Security Symposium (NDSS), 2005.
-
(2005)
Proc. of Network and Distributed System Security Symposium (NDSS)
-
-
Newsome, J.1
Song, D.2
-
22
-
-
33751051489
-
Misleading worm signature generators using deliberate noise injection
-
R. Perdisci, D. Dagon, W. Lee, P. Fogla, and M. Sharif. Misleading worm signature generators using deliberate noise injection. In Proc. of IEEE Symposium on Security and Privacy, pages 17–31, 2006.
-
(2006)
Proc. of IEEE Symposium on Security and Privacy
, pp. 17-31
-
-
Perdisci, R.1
Dagon, D.2
Lee, W.3
Fogla, P.4
Sharif, M.5
-
23
-
-
60649088451
-
McBoost: Boosting scalability in malware collection and analysis using statistical classification of executables
-
R. Perdisci, A. Lanzi, and W. Lee. McBoost: Boosting scalability in malware collection and analysis using statistical classification of executables. In Proc. of Annual Computer Security Applications Conference (ACSAC), pages 301–310, 2008.
-
(2008)
Proc. of Annual Computer Security Applications Conference (ACSAC)
, pp. 301-310
-
-
Perdisci, R.1
Lanzi, A.2
Lee, W.3
-
24
-
-
85080711655
-
The ghost in the browser: Analysis of web-based malware
-
N. Provos, D. McNamee, P. Mavrommatis, K. Wang, and N. Modadugu. The ghost in the browser: Analysis of web-based malware. In Proc. of USENIX Workshop on Hot Topics in Understanding Botnets (HotBots), 2007.
-
(2007)
Proc. of USENIX Workshop on Hot Topics in Understanding Botnets (HotBots)
-
-
Provos, N.1
McNamee, D.2
Mavrommatis, P.3
Wang, K.4
Modadugu, N.5
-
25
-
-
38949156579
-
Linear-time computation of similarity measures for sequential data
-
K. Rieck and P. Laskov. Linear-time computation of similarity measures for sequential data. Journal of Machine Learning Research, 9(Jan):23–48, 2008.
-
(2008)
Journal of Machine Learning Research
, vol.9
, Issue.Jan
, pp. 23-48
-
-
Rieck, K.1
Laskov, P.2
-
28
-
-
0016572913
-
A vector space model for automatic indexing
-
G. Salton, A. Wong, and C. Yang. A vector space model for automatic indexing. Communications of the ACM, 18(11):613–620, 1975.
-
(1975)
Communications of the ACM
, vol.18
, Issue.11
, pp. 613-620
-
-
Salton, G.1
Wong, A.2
Yang, C.3
-
29
-
-
77955182005
-
All you ever wanted to know about dynamic taint analysis and forward symbolic execution (but might have been afraid to ask)
-
E. Schwartz, T. Avgerinos, and D. Brumley. All you ever wanted to know about dynamic taint analysis and forward symbolic execution (but might have been afraid to ask). In Proc. of IEEE Symposium on Security and Privacy, pages 317–331, 2010.
-
(2010)
Proc. of IEEE Symposium on Security and Privacy
, pp. 317-331
-
-
Schwartz, E.1
Avgerinos, T.2
Brumley, D.3
-
30
-
-
77955209381
-
Outside the closed world: On using machine learning for network intrusion detection
-
R. Sommer and V. Paxson. Outside the closed world: On using machine learning for network intrusion detection. In Proc. of IEEE Symposium on Security and Privacy, pages 305–316, 2010.
-
(2010)
Proc. of IEEE Symposium on Security and Privacy
, pp. 305-316
-
-
Sommer, R.1
Paxson, V.2
-
31
-
-
83755209149
-
On the infeasibility of modeling polymorphic shellcode: Re-thinking the role of learning in intrusion detection systems
-
Y. Song, M. Locasto, A. Stavrou, A. D. Keromytis, and S. J. Stolfo. On the infeasibility of modeling polymorphic shellcode: Re-thinking the role of learning in intrusion detection systems. Machine Learning, 2009.
-
(2009)
Machine Learning
-
-
Song, Y.1
Locasto, M.2
Stavrou, A.3
Keromytis, A.D.4
Stolfo, S.J.5
-
33
-
-
84949505015
-
ITS4: A static vulnerability scanner for C and C++ code
-
J. Viega, J. Bloch, Y. Kohno, and G. McGraw. ITS4: A static vulnerability scanner for C and C++ code. In Proc. of Annual Computer Security Applications Conference (ACSAC), pages 257–267, 2000.
-
(2000)
Proc. of Annual Computer Security Applications Conference (ACSAC)
, pp. 257-267
-
-
Viega, J.1
Bloch, J.2
Kohno, Y.3
McGraw, G.4
-
35
-
-
84911945054
-
-
visited April
-
D. A. Wheeler. Flawfinder. http://www.dwheeler.com/flawfinder/, visited April, 2011.
-
(2011)
Flawfinder
-
-
Wheeler, D.A.1
|