A taxonomy of computer worms
暂无分享,去创建一个
Robert K. Cunningham | Vern Paxson | Stuart Staniford-Chen | Nicholas Weaver | V. Paxson | N. Weaver | R. Cunningham | Stuart Staniford-Chen
[1] Jon A. Rochlis,et al. With microscope and tweezers: an analysis of the Internet virus of November 1988 , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.
[2] Robert Wahbe,et al. Efficient software-based fault isolation , 1994, SOSP '93.
[3] Moti Yung,et al. Cryptovirology: extortion-based security threats and countermeasures , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[4] Crispan Cowan,et al. StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks , 1998, USENIX Security Symposium.
[5] James Cheney,et al. Cyclone: A Safe Dialect of C , 2002, USENIX Annual Technical Conference, General Track.
[6] George C. Necula,et al. CCured: type-safe retrofitting of legacy code , 2002, POPL '02.
[7] Matthew M. Williamson,et al. Throttling viruses: restricting propagation to defeat malicious mobile code , 2002, 18th Annual Computer Security Applications Conference, 2002. Proceedings..
[8] Vern Paxson,et al. How to Own the Internet in Your Spare Time , 2002, USENIX Security Symposium.
[9] Aviel D. Rubin,et al. Defending against an Internet-based attack on the physical world , 2002, TOIT.
[10] David Moore,et al. Code-Red: a case study on the spread and victims of an internet worm , 2002, IMW '02.
[11] Eric Rescorla. Security Holes . . . Who Cares? , 2003, USENIX Security Symposium.
[12] Kevin A. Kwiat,et al. Modeling the spread of active worms , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[13] Matthew M. Williamson,et al. Implementing and Testing a Virus Throttle , 2003, USENIX Security Symposium.
[14] Stefan Savage,et al. Inside the Slammer Worm , 2003, IEEE Secur. Priv..
[15] Michael D. Smith,et al. Access for sale: a new class of worm , 2003, WORM '03.
[16] Aviel D. Rubin,et al. Defending against an Internet-based attack on the physical world , 2004, ACM Trans. Internet Techn..