MulVAL: A Logic-based Network Security Analyzer
暂无分享,去创建一个
Andrew W. Appel | Xinming Ou | Sudhakar Govindavajhala | A. Appel | Xinming Ou | Sudhakar Govindavajhala
[1] Joan Feigenbaum,et al. Delegation logic: A logic-based approach to distributed authorization , 2003, TSEC.
[2] William L. Fithen,et al. Formal modeling of vulnerability , 2004, Bell Labs Technical Journal.
[3] Giridhar Pemmasani,et al. Online Justification for Tabled Logic Programs , 2004, FLOPS.
[4] Robert W. Baldwin. Rule Based Analysis of Computer Security , 1987, COMPCON.
[5] Kenneth A. Ross,et al. Unfounded sets and well-founded semantics for general logic programs , 1988, PODS.
[6] David E. Culler,et al. A blueprint for introducing disruptive technology into the Internet , 2003, CCRV.
[7] Avishai Wool,et al. Firmato: A novel firewall management toolkit , 2004, TOCS.
[8] John DeTreville,et al. Binder, a logic-based security language , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[9] Paul Ammann,et al. Using model checking to analyze network vulnerabilities , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[10] Juliana Freire,et al. XSB: A System for Effciently Computing WFS , 1997, LPNMR.
[11] Eugene H. Spafford,et al. The COPS Security Checker System , 1990, USENIX Summer.
[12] Samuel T. King,et al. Enriching Intrusion Alerts Through Multi-Host Causality , 2005, NDSS.
[13] Georg Gottlob,et al. Complexity and expressive power of logic programming , 2001, CSUR.
[14] Susan Hinrichs,et al. Policy-based management: bridging the gap , 1999, Proceedings 15th Annual Computer Security Applications Conference (ACSAC'99).
[15] Somesh Jha,et al. Automated generation and analysis of attack graphs , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[16] S. Jajodia,et al. Chapter 5 TOPOLOGICAL ANALYSIS OF NETWORK ATTACK VULNERABILITY , 2003 .
[17] Prasad Rao,et al. Automatic management of network security policy , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.
[18] Joshua D. Guttman,et al. Filtering postures: local enforcement for global policies , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[19] D. Warren,et al. Xsb -a System for Eeciently Computing Well Founded Semantics , 1997 .
[20] C. R. Ramakrishnan,et al. Model-Based Analysis of Configuration Vulnerabilities , 2002, J. Comput. Secur..
[21] Steven J. Templeton,et al. A requires/provides model for computer attacks , 2001, NSPW '00.
[22] Karl N. Levitt,et al. NetKuang - A Multi-Host Configuration Vulnerability Checker , 1996, USENIX Security Symposium.
[23] Duminda Wijesekera,et al. Scalable, graph-based network vulnerability analysis , 2002, CCS '02.
[24] Frédéric Cuppens,et al. Alert correlation in a cooperative intrusion detection framework , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[25] Sushil Jajodia,et al. Efficient minimum-cost network hardening via exploit dependency graphs , 2003, 19th Annual Computer Security Applications Conference, 2003. Proceedings..
[26] Peng Ning,et al. Constructing attack scenarios through correlation of intrusion alerts , 2002, CCS '02.