Reverse Engineering of Network Signatures
暂无分享,去创建一个
Giovanni Vigna | William K. Robertson | Christopher Kruegel | Richard A. Kemmerer | William Robertson | Darren Mutz | C. Kruegel | D. Mutz | R. Kemmerer | G. Vigna
[1] Martin Roesch,et al. Snort - Lightweight Intrusion Detection for Networks , 1999 .
[2] Saumya K. Debray,et al. Obfuscation of executable code to improve resistance to static disassembly , 2003, CCS '03.
[3] Giovanni Vigna,et al. An experience developing an IDS stimulator for the black-box testing of network intrusion detection systems , 2003, 19th Annual Computer Security Applications Conference, 2003. Proceedings..
[4] Calcagnini Giovanni. Fun with Packets: Designing a Stick , 2002 .
[5] Hervé Debar,et al. Evaluation of the Diagnostic Capabilities of Commercial Intrusion Detection Systems , 2002, RAID.
[6] Mark Handley,et al. Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics , 2001, USENIX Security Symposium.
[7] David A. Wagner,et al. Mimicry attacks on host-based intrusion detection systems , 2002, CCS '02.
[8] Marcus J. Ranum,et al. Implementing a generalized tool for network monitoring , 1997, Inf. Secur. Tech. Rep..
[9] Giovanni Vigna,et al. Testing network-based intrusion detection signatures using mutant exploits , 2004, CCS '04.
[10] Vern Paxson,et al. Bro: a system for detecting network intruders in real-time , 1998, Comput. Networks.
[11] Giovanni Vigna,et al. NetSTAT: A Network-based Intrusion Detection System , 1999, J. Comput. Secur..
[12] Thomas Henry Ptacek,et al. Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection , 1998 .
[13] Christopher Krügel,et al. Static Disassembly of Obfuscated Binaries , 2004, USENIX Security Symposium.
[14] Christopher Krügel,et al. Detecting kernel-level rootkits through binary analysis , 2004, 20th Annual Computer Security Applications Conference.
[15] Dan S. Wallach,et al. Denial of Service via Algorithmic Complexity Attacks , 2003, USENIX Security Symposium.
[16] Cristina Cifuentes,et al. Decompilation of binary programs , 1995, Softw. Pract. Exp..
[17] Vern Paxson,et al. Active mapping: resisting NIDS evasion without altering traffic , 2003, 2003 Symposium on Security and Privacy, 2003..