ShieldGen: Automatic Data Patch Generation for Unknown Vulnerabilities with Informed Probing
暂无分享,去创建一个
[1] Stefan Savage,et al. Inside the Slammer Worm , 2003, IEEE Secur. Priv..
[2] Michael Vrable,et al. Scalability, fidelity, and containment in the potemkin virtual honeyfarm , 2005, SOSP '05.
[3] Hao Wang,et al. Towards automatic generation of vulnerability-based signatures , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[4] David Brumley,et al. Vulnerability-Specific Execution Filtering for Exploit Prevention on Commodity Software , 2006, NDSS.
[5] George Varghese,et al. Automated Worm Fingerprinting , 2004, OSDI.
[6] Miguel Castro,et al. Vigilante: end-to-end containment of internet worms , 2005, SOSP '05.
[7] ともやん,et al. Microsoft Virtual PC , 2009 .
[8] B. Karp,et al. Autograph: Toward Automated, Distributed Worm Signature Detection , 2004, USENIX Security Symposium.
[9] Somesh Jha,et al. An architecture for generating semantics-aware signatures , 2005 .
[10] Helen J. Wang,et al. Shield: vulnerability-driven network filters for preventing known vulnerability exploits , 2004, SIGCOMM.
[11] Larry L. Peterson,et al. binpac: a yacc for writing application protocol parsers , 2006, IMC '06.
[12] V. Paxson,et al. GQ : Realizing a System to Catch Worms in a Quarter Million Places , 2006 .
[13] James Newsome,et al. Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software , 2005, NDSS.
[14] Frederic T. Chong,et al. Minos: Control Data Attack Prevention Orthogonal to Memory Model , 2004, 37th International Symposium on Microarchitecture (MICRO-37'04).
[15] Zhendong Su,et al. HDD: hierarchical delta debugging , 2006, ICSE.
[16] Randy H. Katz,et al. Protocol-Independent Adaptive Replay of Application Dialog , 2006, NDSS.
[17] Zhenkai Liang,et al. Fast and automated generation of attack signatures: a basis for building self-protecting servers , 2005, CCS '05.
[18] Wenke Lee,et al. Misleading worm signature generators using deliberate noise injection , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[19] Zhendong Su,et al. On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits , 2005, CCS '05.
[20] Helen J. Wang,et al. Generic Application-Level Protocol Analyzer and its Language , 2007, NDSS.
[21] Jun Xu,et al. Packet vaccine: black-box exploit detection and signature generation , 2006, CCS '06.
[22] James Newsome,et al. Polygraph: automatically generating signatures for polymorphic worms , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[23] Jon Crowcroft,et al. Honeycomb , 2004, Comput. Commun. Rev..