-
1
-
-
85080618052
-
-
Internet Storm Center. http://isc.sans.org.
-
-
-
-
2
-
-
85080623159
-
-
Iroffer. http://iroffer.org/.
-
-
-
-
3
-
-
85080527954
-
-
Napster. http://www.napster.com/.
-
-
-
-
4
-
-
85080592234
-
-
psyBNC. http://www.psychoid.net/psybnc.html.
-
PsyBNC
-
-
-
5
-
-
85080596230
-
-
Sebek. http://www.honeynet.org/tools/sebek/.
-
Sebek
-
-
-
6
-
-
85080479812
-
-
Snort. http://www.snort.org.
-
-
-
-
7
-
-
84883699276
-
-
Snort-inline. http://sourceforge.net/projects/snort-inline/.
-
Snort-inline
-
-
-
8
-
-
85080521930
-
-
Tcpdump. http://www.tcpdump.org.
-
-
-
-
9
-
-
85080508037
-
-
The Honeynet Project. http://www.honeynet.org.
-
-
-
-
10
-
-
85080585932
-
-
Virtual PC http://www.microsoft.com/windowsxp/virtualpc/.
-
Virtual PC
-
-
-
11
-
-
85080480804
-
-
VMware. http://www.vmware.com/.
-
-
-
-
12
-
-
85080475350
-
-
VMWare FootPrinting. http://chitchat.at.infoseek.co.jp/vmware/vmtools.html.
-
VMWare FootPrinting
-
-
-
18
-
-
85080624971
-
-
Dec. 2003
-
Collapsar. http://www.cs.purdue.edu/homes/jiangx/collapsar, Dec. 2003.
-
Collapsar
-
-
-
20
-
-
85080484209
-
-
MA-055.082003: W32 Aug. 2003
-
MA-055.082003: W32. Nachi Worm. http://www.mycert.org.my/advisory/MA-055.082003.html, Aug. 2003.
-
Nachi Worm.
-
-
-
21
-
-
2342553315
-
-
Microsoft Security Bulletin MS03-026. http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/bulletin/MS03-026.asp, 2003.
-
(2003)
Microsoft Security Bulletin MS03-026
-
-
-
22
-
-
21644433634
-
Xen and the art of virtualization
-
Oct.
-
P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, R. N. Alex Ho, I. Pratt, and A. Warfield. Xen and the Art of Virtualization. Proceedings of ACM Symposium on Operating Systems Principles (SOSP 2003), Oct. 2003.
-
(2003)
Proceedings of ACM Symposium on Operating Systems Principles (SOSP 2003)
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Alex Ho, R.N.6
Pratt, I.7
Warfield, A.8
-
24
-
-
85080624812
-
-
J. Dike. User Mode Linux. http://user-mode-linux.sourceforge.net.
-
-
-
Dike, J.1
-
25
-
-
84978401615
-
ReVirt: Enabling intrusion analysis through virtual-machine logging and replay
-
Dec.
-
G. W. Dunlap, S. T. King, S. Cinar, M. A. Basrai, and P. M. Chen. ReVirt: Enabling Intrusion Analysis Through Virtual-Machine Logging and Replay. Proceedings of USENIX Symposium on Operating Systems Design and Implementation (OSDI 2002), Dec. 2002.
-
(2002)
Proceedings of USENIX Symposium on Operating Systems Design and Implementation (OSDI 2002)
-
-
Dunlap, G.W.1
King, S.T.2
Cinar, S.3
Basrai, M.A.4
Chen, P.M.5
-
27
-
-
84900049540
-
Forensix: A robust, HighPerformance reconstruction system
-
Oct.
-
A. Goel, M. Shea, S. Ahuja, W.-C. Feng, W.-C. Feng, D. Maier, and J. Walpole. Forensix: A Robust, HighPerformance Reconstruction System. The 19th Symposium on Operating Systems Principles (SOSP) (poster session), Oct. 2003.
-
(2003)
The 19th Symposium on Operating Systems Principles (SOSP) (poster Session)
-
-
Goel, A.1
Shea, M.2
Ahuja, S.3
Feng, W.-C.4
Feng, W.-C.5
Maier, D.6
Walpole, J.7
-
30
-
-
34250341684
-
Implementing a user-mode linux with minimal changes from original kernel
-
Koln, Germany, Sept.
-
H. J. Hoxer, K. Buchacker, and V. Sieh. Implementing a User-Mode Linux with Minimal Changes from Original Kernel. Linux-Kongress 2002, Koln, Germany, Sept. 2002.
-
(2002)
Linux-Kongress 2002
-
-
Hoxer, H.J.1
Buchacker, K.2
Sieh, V.3
-
34
-
-
77949476064
-
-
Oct. 2003
-
J. V. Miller. SHV4 Rootkit Analysis. https://tms.symantec.com/members/AnalystReports/030929-Analysis-SHV4Rootkit.pdf, Oct. 2003.
-
SHV4 Rootkit Analysis
-
-
Miller, J.V.1
-
39
-
-
10444240459
-
-
Aug.
-
L. Spitzner. Honeypot Farms. http://www.securityfocus.com/infocus/1720, Aug. 2003.
-
(2003)
Honeypot Farms
-
-
Spitzner, L.1
-
43
-
-
16344396406
-
Monitoring and early warning for internet worms
-
Washington DC, USA, Oct.
-
C. C. Zou, L. Gao, W. Gong, and D. Towsley. Monitoring and Early Warning for Internet Worms. Proceedings of the 10th ACM Conference on Computer and Communication Security (CCS 2003), Washington DC, USA, Oct. 2003.
-
(2003)
Proceedings of the 10th ACM Conference on Computer and Communication Security (CCS 2003)
-
-
Zou, C.C.1
Gao, L.2
Gong, W.3
Towsley, D.4
|