Experiences Using Minos as a Tool for Capturing and Analyzing Novel Worms for Unknown Vulnerabilities
暂无分享,去创建一个
[1] David Litchfield. Defeating the Stack Based Buffer Overflow Prevention Mechanism of Microsoft Windows 2003 Server , 2003 .
[2] James Newsome,et al. Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software , 2005, NDSS.
[3] Helen J. Wang,et al. Shield: vulnerability-driven network filters for preventing known vulnerability exploits , 2004, SIGCOMM.
[4] Jun Xu,et al. WORM vs. WORM: preliminary study of an active counter-attack mechanism , 2004, WORM '04.
[5] K. J. Bma. Integrity considerations for secure computer systems , 1977 .
[6] Guofei Gu,et al. HoneyStat: Local Worm Detection Using Honeypots , 2004, RAID.
[7] Wenke Lee,et al. Advanced Polymorphic Worms: Evading IDS by Blending in with Normal Traffic , 2005 .
[8] Karl N. Levitt,et al. Buttercup: on network-based detection of polymorphic buffer overflow vulnerabilities , 2004, 2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507).
[9] Vern Paxson,et al. How to Own the Internet in Your Spare Time , 2002, USENIX Security Symposium.
[10] Angelos D. Keromytis,et al. Countering network worms through automatic patch generation , 2005, IEEE Security & Privacy Magazine.
[11] Lance Spitzner,et al. The Honeynet Project: Trapping the Hackers , 2003, IEEE Secur. Priv..
[12] David Zhang,et al. Secure program execution via dynamic information flow tracking , 2004, ASPLOS XI.
[13] George Varghese,et al. Automated Worm Fingerprinting , 2004, OSDI.
[14] Frederic T. Chong,et al. Minos: Control Data Attack Prevention Orthogonal to Memory Model , 2004, 37th International Symposium on Microarchitecture (MICRO-37'04).
[15] Frederic T. Chong,et al. A security assessment of the minos architecture , 2005, CARN.
[16] Christopher Krügel,et al. Accurate Buffer Overflow Detection via Abstract Payload Execution , 2002, RAID.