Isolating Intrusions by Automatic Experiments
暂无分享,去创建一个
[1] Thomas J. LeBlanc,et al. Debugging Parallel Programs with Instant Replay , 1987, IEEE Transactions on Computers.
[2] Satish Narayanasamy,et al. BugNet: continuously recording program execution for deterministic replay debugging , 2005, 32nd International Symposium on Computer Architecture (ISCA'05).
[3] Dan Farmer,et al. Forensic Discovery , 2004 .
[4] Nicholas Nethercote,et al. Dynamic Binary Analysis and Instrumentation , 2004 .
[5] James Newsome,et al. Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software , 2005, NDSS.
[6] H. Cleve,et al. Locating causes of program failures , 2005, Proceedings. 27th International Conference on Software Engineering, 2005. ICSE 2005..
[7] Samuel T. King,et al. Backtracking intrusions , 2003, SOSP '03.
[8] Peter Szor,et al. An Analysis of the Slapper Worm Ex-ploit , 2003 .
[9] Jong-Deok Choi,et al. Isolating failure-inducing thread schedules , 2002, ISSTA '02.
[10] Samuel T. King,et al. ReVirt: enabling intrusion analysis through virtual-machine logging and replay , 2002, OPSR.
[11] Srikanth Kandula,et al. Flashback: A Lightweight Extension for Rollback and Deterministic Replay for Software Debugging , 2004, USENIX Annual Technical Conference, General Track.
[12] Andreas Zeller,et al. Simplifying and Isolating Failure-Inducing Input , 2002, IEEE Trans. Software Eng..
[13] Friedemann Mattern,et al. Detecting causal relationships in distributed computations: In search of the holy grail , 1994, Distributed Computing.
[14] Niels Provos,et al. Improving Host Security with System Call Policies , 2003, USENIX Security Symposium.
[15] 李友. 新人类一族——猜火车(Trainspotting) , 1997 .
[16] Frank Tip,et al. A survey of program slicing techniques , 1994, J. Program. Lang..
[17] B. Karp,et al. Autograph: Toward Automated, Distributed Worm Signature Detection , 2004, USENIX Security Symposium.
[18] Sumeet Singh,et al. The EarlyBird System for Real-time Detection of Unknown Worms , 2005 .
[19] Ian Goldberg,et al. A Secure Environment for Untrusted Helper Applications ( Confining the Wily Hacker ) , 1996 .
[20] James Newsome,et al. Polygraph: automatically generating signatures for polymorphic worms , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[21] A. Zeller. Isolating cause-effect chains from computer programs , 2002, SIGSOFT '02/FSE-10.
[22] Angelos D. Keromytis,et al. Countering network worms through automatic patch generation , 2005, IEEE Security & Privacy Magazine.
[23] R. Sekar,et al. User-Level Infrastructure for System Call Interposition: A Platform for Intrusion Detection and Confinement , 2000, NDSS.
[24] Salvatore J. Stolfo,et al. Anomalous Payload-Based Network Intrusion Detection , 2004, RAID.
[25] Tal Garfinkel,et al. Traps and Pitfalls: Practical Problems in System Call Interposition Based Security Tools , 2003, NDSS.
[26] Angelos D. Keromytis,et al. Detecting Targeted Attacks Using Shadow Honeypots , 2005, USENIX Security Symposium.
[27] Min Xu,et al. A "flight data recorder" for enabling full-system multiprocessor deterministic replay , 2003, ISCA '03.