Tracing Worm Break-In and Contaminations via Process Coloring: A Provenance-Preserving Approach
暂无分享,去创建一个
Xuxian Jiang | Eugene H. Spafford | Yi-Min Wang | Dongyan Xu | Florian P. Buchholz | Aaron Walters | Yi-Min Wang | E. Spafford | Dongyan Xu | Xuxian Jiang | Aaron Walters
[1] Eyal de Lara,et al. The taser intrusion recovery system , 2005, SOSP '05.
[2] Xuxian Jiang,et al. Provenance-Aware Tracing ofWorm Break-in and Contaminations: A Process Coloring Approach , 2006, 26th IEEE International Conference on Distributed Computing Systems (ICDCS'06).
[3] James G. King,et al. New High-Performance Completion Packer Selection and Deployment for Holstein and Mad Dog Deepwater Gulf of Mexico Projects , 2005 .
[4] Eugene H. Spafford,et al. On the role of file system metadata in digital forensics , 2004, Digit. Investig..
[5] Zhenkai Liang,et al. Isolated program execution: an application transparent approach for executing untrusted programs , 2003, 19th Annual Computer Security Applications Conference, 2003. Proceedings..
[6] Iván Arce,et al. An Analysis of the Slapper Worm , 2003, IEEE Secur. Priv..
[7] James Newsome,et al. Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software , 2005, NDSS.
[8] Leonard J. LaPadula,et al. MITRE technical report 2547, volume II , 1996 .
[9] Benedict G. E. Wiedemann. Protection? , 1998, Science.
[10] Andrew C. Myers,et al. JFlow: practical mostly-static information flow control , 1999, POPL '99.
[11] Xuxian Jiang,et al. Collapsar: A VM-Based Architecture for Network Attack Detention Center , 2004, USENIX Security Symposium.
[12] Helen J. Wang,et al. Virtual Playgrounds for Worm Behavior Investigation , 2005, RAID.
[13] Sushil Jajodia,et al. Recovery from Malicious Transactions , 2002, IEEE Trans. Knowl. Data Eng..
[14] Samuel T. King,et al. Backtracking intrusions , 2003, SOSP '03.
[15] Steven D. Gribble,et al. Using time travel to diagnose computer problems , 2004, EW 11.
[16] Henry L. Owen,et al. Re-establishing Trust in Compromised Systems: Recovering from Rootkits That Trojan the System Call Table , 2004, ESORICS.
[17] SpitznerLance. The Honeynet Project , 2003, S&P 2003.
[18] Tal Garfinkel,et al. A Virtual Machine Introspection Based Architecture for Intrusion Detection , 2003, NDSS.
[19] Jeff Dike,et al. User-mode Linux , 2006, Annual Linux Showcase & Conference.
[20] David D. Clark,et al. A Comparison of Commercial and Military Computer Security Policies , 1987, 1987 IEEE Symposium on Security and Privacy.
[21] Samuel T. King,et al. ReVirt: enabling intrusion analysis through virtual-machine logging and replay , 2002, OPSR.
[22] J. Meseguer,et al. Security Policies and Security Models , 1982, 1982 IEEE Symposium on Security and Privacy.
[23] Tzi-cker Chiueh,et al. Design, implementation, and evaluation of repairable file service , 2003, 2003 International Conference on Dependable Systems and Networks, 2003. Proceedings..
[24] Wei Xu,et al. Taint-Enhanced Policy Enforcement: A Practical Approach to Defeat a Wide Range of Attacks , 2006, USENIX Security Symposium.
[25] Samuel T. King,et al. Enriching Intrusion Alerts Through Multi-Host Causality , 2005, NDSS.
[26] Steven D. Gribble,et al. Configuration Debugging as Search: Finding the Needle in the Haystack , 2004, OSDI.
[27] Eugene H. Spafford,et al. Pervasive binding of labels to system processes , 2005 .
[28] Gil Neiger,et al. Intel virtualization technology , 2005, Computer.
[29] Andrew Warfield,et al. Xen and the art of virtualization , 2003, SOSP '03.
[30] Tal Garfinkel,et al. Shredding Your Garbage: Reducing Data Lifetime Through Secure Deallocation , 2005, USENIX Security Symposium.
[31] Angelos D. Keromytis,et al. MOVE: An End-to-End Solution to Network Denial of Service , 2005, NDSS.
[32] Carl Staelin,et al. lmbench: Portable Tools for Performance Analysis , 1996, USENIX Annual Technical Conference.
[33] M. Franz,et al. Practical , Dynamic Information-flow for Virtual Machines , 2005 .
[34] Samuel T. King,et al. Debugging Operating Systems with Time-Traveling Virtual Machines (Awarded General Track Best Paper Award!) , 2005, USENIX Annual Technical Conference, General Track.
[35] Tal Garfinkel,et al. Understanding data lifetime via whole system simulation , 2004 .
[36] William A. Arbaugh,et al. Copilot - a Coprocessor-based Kernel Runtime Integrity Monitor , 2004, USENIX Security Symposium.
[37] Niels Provos,et al. Improving Host Security with System Call Policies , 2003, USENIX Security Symposium.
[38] A. Turing. On Computable Numbers, with an Application to the Entscheidungsproblem. , 1937 .
[39] Wu-chi Feng,et al. Forensix: a robust, high-performance reconstruction system , 2005, 25th IEEE International Conference on Distributed Computing Systems Workshops.
[40] Thorsten Holz,et al. NoSEBrEaK - attacking honeynets , 2004, Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004..
[41] Elaine Shi,et al. Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems , 2005, SOSP '05.
[42] Dorothy E. Denning,et al. A lattice model of secure information flow , 1976, CACM.