Cross-Layer Damage Assessment for Cyber Situational Awareness
暂无分享,去创建一个
Xiaoqi Jia | Peng Liu | Kun Bai | Xi Xiong | Shengzhi Zhang | Jason H. Li | Yoon-chan Jhi
[1] Richard Lippmann,et al. Practical Attack Graph Generation for Network Defense , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).
[2] Robert P. Goldberg,et al. Survey of virtual machine research , 1974, Computer.
[3] Sushil Jajodia,et al. Recovery from Malicious Transactions , 2002, IEEE Trans. Knowl. Data Eng..
[4] James Newsome,et al. Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software , 2005, NDSS.
[5] Angelos Stavrou,et al. From STEM to SEAD: Speculative Execution for Automated Defense , 2007, USENIX Annual Technical Conference.
[6] Somesh Jha,et al. Automated generation and analysis of attack graphs , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[7] Peng Ning,et al. Constructing attack scenarios through correlation of intrusion alerts , 2002, CCS '02.
[8] Duminda Wijesekera,et al. Scalable, graph-based network vulnerability analysis , 2002, CCS '02.
[9] Yuanyuan Zhou,et al. Rx: treating bugs as allergies---a safe method to survive software failures , 2005, SOSP '05.
[10] Xuxian Jiang,et al. Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction , 2007, CCS '07.
[11] Angelos D. Keromytis,et al. Building a Reactive Immune System for Software Services , 2005, USENIX Annual Technical Conference, General Track.
[12] Wenke Lee,et al. Lares: An Architecture for Secure Active Monitoring Using Virtualization , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[13] Frédéric Cuppens,et al. Alert correlation in a cooperative intrusion detection framework , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[14] Peng Liu,et al. Self-healing workflow systems under attacks , 2004, 24th International Conference on Distributed Computing Systems, 2004. Proceedings..
[15] Brajendra Panda,et al. Reconstructing the Database after Electronic Attacks , 1998, DBSec.
[16] Tzi-cker Chiueh,et al. DIRA: Automatic Detection, Identification and Repair of Control-Hijacking Attacks , 2005, NDSS.
[17] Samuel T. King,et al. Backtracking intrusions , 2003, SOSP '03.
[18] Samuel T. King,et al. ReVirt: enabling intrusion analysis through virtual-machine logging and replay , 2002, OPSR.
[19] Fabrice Bellard,et al. QEMU, a Fast and Portable Dynamic Translator , 2005, USENIX ATC, FREENIX Track.
[20] Eyal de Lara,et al. The taser intrusion recovery system , 2005, SOSP '05.
[21] Srikanth Kandula,et al. Flashback: A Lightweight Extension for Rollback and Deterministic Replay for Software Debugging , 2004, USENIX Annual Technical Conference, General Track.
[22] Brian D. Noble,et al. When Virtual Is Better Than Real , 2001 .
[23] Tal Garfinkel,et al. VMwareDecoupling Dynamic Program Analysis from Execution in Virtual Environments , 2008, USENIX Annual Technical Conference.
[24] Cynthia A. Phillips,et al. Computer-attack graph generation tool , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.
[25] Xinming Ou,et al. A scalable approach to attack graph generation , 2006, CCS '06.
[26] Heng Yin,et al. Panorama: capturing system-wide information flow for malware detection and analysis , 2007, CCS '07.
[27] Peng Liu,et al. A data damage tracking quarantine and recovery (DTQR) scheme for mission-critical database systems , 2009, EDBT '09.
[28] Sushil Jajodia. Topological analysis of network attack vulnerability , 2007, ASIACCS '07.
[29] Daniel M. Roy,et al. Enhancing Server Availability and Security Through Failure-Oblivious Computing , 2004, OSDI.