Polygraph: automatically generating signatures for polymorphic worms
暂无分享,去创建一个
[1] M S Waterman,et al. Identification of common molecular subsequences. , 1981, Journal of molecular biology.
[2] Lucas Chi Kwong Hui,et al. Color Set Size Problem with Application to String Matching , 1992, CPM.
[3] Jun S. Liu,et al. Detecting subtle sequence signals: a Gibbs sampling strategy for multiple alignment. , 1993, Science.
[4] Charles Elkan,et al. Fitting a Mixture Model By Expectation Maximization To Discover Motifs In Biopolymer , 1994, ISMB.
[5] Aurobindo Sundaram,et al. An introduction to intrusion detection , 1996, CROS.
[6] Dan Gusfield,et al. Algorithms on Strings, Trees, and Sequences - Computer Science and Computational Biology , 1997 .
[7] Carey Nachenberg,et al. Computer virus-antivirus coevolution , 1997, Commun. ACM.
[8] Vern Paxson,et al. Bro: a system for detecting network intruders in real-time , 1998, Comput. Networks.
[9] Peter Szor,et al. HUNTING FOR METAMORPHIC , 2001 .
[10] B. Karp,et al. Autograph: Toward Automated, Distributed Worm Signature Detection , 2004, USENIX Security Symposium.
[11] Wei Wu,et al. LOGOS: a modular Bayesian model for de novo motif detection , 2003, Computational Systems Bioinformatics. CSB2003. Proceedings of the 2003 IEEE Bioinformatics Conference. CSB2003.
[12] Karl N. Levitt,et al. Buttercup: on network-based detection of polymorphic buffer overflow vulnerabilities , 2004, 2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507).
[13] George Varghese,et al. Automated Worm Fingerprinting , 2004, OSDI.
[14] Eric P Xing,et al. MotifPrototyper: A Bayesian profile model for motif families , 2004, Proc. Natl. Acad. Sci. USA.
[15] J. Crowcroft,et al. Honeycomb: creating intrusion detection signatures using honeypots , 2004, Comput. Commun. Rev..
[16] Helen J. Wang,et al. Shield: vulnerability-driven network filters for preventing known vulnerability exploits , 2004, SIGCOMM '04.
[17] Giovanni Vigna,et al. Testing network-based intrusion detection signatures using mutant exploits , 2004, CCS '04.
[18] James Newsome,et al. Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software , 2005, NDSS.
[19] Maxime Crochemore,et al. Algorithms on strings , 2007 .