Privacy-breaching Behavior Analysis
暂无分享,去创建一个
[1] Hao Chen,et al. Back to the Future: A Framework for Automatic Malware Removal and System Repair , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).
[2] Samuel T. King,et al. Backtracking intrusions , 2003, SOSP '03.
[3] Somesh Jha,et al. Semantics-aware malware detection , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[4] Miguel Castro,et al. Vigilante: end-to-end containment of internet worms , 2005, SOSP '05.
[5] James Newsome,et al. Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software , 2005, NDSS.
[6] David Zhang,et al. Secure program execution via dynamic information flow tracking , 2004, ASPLOS XI.
[7] Eyal de Lara,et al. The taser intrusion recovery system , 2005, SOSP '05.
[8] Herbert Bos,et al. Argos: an emulator for fingerprinting zero-day attacks for advertised honeypots with automatic signature generation , 2006, EuroSys.
[9] Heng Yin,et al. Dynamic Spyware Analysis , 2007, USENIX Annual Technical Conference.
[10] Christopher Krügel,et al. Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis , 2007, NDSS.
[11] Frederic T. Chong,et al. Minos: Control Data Attack Prevention Orthogonal to Memory Model , 2004, 37th International Symposium on Microarchitecture (MICRO-37'04).
[12] Sy-Yen Kuo,et al. Gatekeeper: Monitoring Auto-Start Extensibility Points (ASEPs) for Spyware Management , 2004, LISA.
[13] Tal Garfinkel,et al. Understanding data lifetime via whole system simulation , 2004 .
[14] Yi-Min Wang,et al. Detecting stealth software with Strider GhostBuster , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).