Packet vaccine: black-box exploit detection and signature generation
暂无分享,去创建一个
[1] Karl N. Levitt,et al. Buttercup: on network-based detection of polymorphic buffer overflow vulnerabilities , 2004, 2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507).
[2] Miguel Castro,et al. Vigilante: end-to-end containment of internet worms , 2005, SOSP '05.
[3] Hao Wang,et al. Towards automatic generation of vulnerability-based signatures , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[4] Ravishankar K. Iyer,et al. Measuring Fault Tolerance with the FTAPE Fault Injection Tool , 1995, MMB.
[5] Ming-Yang Kao,et al. Hamsa: fast signature generation for zero-day polymorphic worms with provable attack resilience , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[6] David Brumley,et al. Vulnerability-Specific Execution Filtering for Exploit Prevention on Commodity Software , 2006, NDSS.
[7] B. Karp,et al. Autograph: Toward Automated, Distributed Worm Signature Detection , 2004, USENIX Security Symposium.
[8] Somesh Jha,et al. An architecture for generating semantics-aware signatures , 2005 .
[9] Salvatore J. Stolfo,et al. FLIPS: Hybrid Adaptive Intrusion Prevention , 2005, RAID.
[10] Angelos D. Keromytis,et al. Detecting Targeted Attacks Using Shadow Honeypots , 2005, USENIX Security Symposium.
[11] Helen J. Wang,et al. Shield: vulnerability-driven network filters for preventing known vulnerability exploits , 2004, SIGCOMM.
[12] Srikanth Kandula,et al. Flashback: A Lightweight Extension for Rollback and Deterministic Replay for Software Debugging , 2004, USENIX Annual Technical Conference, General Track.
[13] James C. Reynolds,et al. On-line intrusion detection and attack prevention using diversity, generate-and-test, and generalization , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.
[14] George Varghese,et al. Automated Worm Fingerprinting , 2004, OSDI.
[15] Christopher Krügel,et al. Polymorphic Worm Detection Using Structural Information of Executables , 2005, RAID.
[16] James Newsom,et al. Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software, Network and Distributed System Security Symposium Conference Proceedings : 2005 , 2005 .
[17] Yong Tang,et al. Defending against Internet worms: a signature-based approach , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[18] Samuel T. King,et al. ReVirt: enabling intrusion analysis through virtual-machine logging and replay , 2002, OPSR.
[19] Steven D. Gribble,et al. The limits of global scanning worm detectors in the presence of background noise , 2005, WORM '05.
[20] Barton P. Miller,et al. Fuzz Revisited: A Re-examination of the Reliability of UNIX Utilities and Services , 1995 .
[21] Angelos D. Keromytis,et al. Building a Reactive Immune System for Software Services , 2005, USENIX Annual Technical Conference, General Track.
[22] Zhenkai Liang,et al. Fast and automated generation of attack signatures: a basis for building self-protecting servers , 2005, CCS '05.
[23] Wenke Lee,et al. Misleading worm signature generators using deliberate noise injection , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[24] Frederic T. Chong,et al. Minos: Control Data Attack Prevention Orthogonal to Memory Model , 2004, 37th International Symposium on Microarchitecture (MICRO-37'04).
[25] Herbert Bos,et al. SweetBait: Zero-hour worm detection and containment using low- and high-interaction honeypots , 2007, Comput. Networks.
[26] John D. Musa,et al. The operational profile , 1996 .
[27] Peng Ning,et al. Automatic diagnosis and response to memory corruption vulnerabilities , 2005, CCS '05.
[28] James Newsome,et al. Polygraph: automatically generating signatures for polymorphic worms , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[29] Zhendong Su,et al. On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits , 2005, CCS '05.
[30] Salvatore J. Stolfo,et al. Anomalous Payload-Based Network Intrusion Detection , 2004, RAID.
[31] Paul C. van Oorschot. Revisiting Software Protection , 2003, ISC.
[32] Nasir D. Memon,et al. Preventing Piracy, Reverse Engineering, and Tampering , 2003, Computer.
[33] Jon Crowcroft,et al. Honeycomb , 2004, Comput. Commun. Rev..
[34] Jacob A. Abraham,et al. FERRARI: A Flexible Software-Based Fault and Error Injection System , 1995, IEEE Trans. Computers.
[35] Christopher Krügel,et al. Accurate Buffer Overflow Detection via Abstract Payload Execution , 2002, RAID.
[36] Daniel P. Siewiorek,et al. Fault Injection Experiments Using FIAT , 1990, IEEE Trans. Computers.