Understanding Precision in Host Based Intrusion Detection
暂无分享,去创建一个
[1] Mihai Budiu,et al. Control-flow integrity principles, implementations, and applications , 2009, TSEC.
[2] Somesh Jha,et al. Efficient Context-Sensitive Intrusion Detection , 2004, NDSS.
[3] Christopher Krügel,et al. Automating Mimicry Attacks Using Static Binary Analysis , 2005, USENIX Security Symposium.
[4] David A. Wagner. Static Analysis and Software Assurance , 2001, SAS.
[5] Weibo Gong,et al. Anomaly detection using call stack information , 2003, 2003 Symposium on Security and Privacy, 2003..
[6] R. Sekar,et al. Dataflow anomaly detection , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[7] Ajitha Rajan,et al. Requirements Coverage as an Adequacy Measure for Conformance Testing , 2008, ICFEM.
[8] Tzi-cker Chiueh,et al. Automatic extraction of accurate application-specific sandboxing policy , 2005, MILCOM 2005 - 2005 IEEE Military Communications Conference.
[9] Kymie M. C. Tan,et al. Undermining an Anomaly-Based Intrusion Detection System Using Common Exploits , 2002, RAID.
[10] David A. Wagner,et al. Intrusion detection via static analysis , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[11] Tao Zhang,et al. Anomalous path detection with hardware support , 2005, CASES '05.
[12] Dieter Gollmann,et al. Computer Security – ESORICS 2003 , 2003, Lecture Notes in Computer Science.
[13] William Landi,et al. Undecidability of static analysis , 1992, LOPL.
[14] Barton P. Miller,et al. Dynamic program instrumentation for scalable performance tools , 1994, Proceedings of IEEE Scalable High Performance Computing Conference.
[15] Tzi-cker Chiueh,et al. Accurate and Automated System Call Policy-Based Intrusion Prevention , 2006, International Conference on Dependable Systems and Networks (DSN'06).
[16] Martín Abadi,et al. A Theory of Secure Control Flow , 2005, ICFEM.
[17] David Wagner,et al. Static analysis and computer security: new techniques for software assurance , 2000 .
[18] Debin Gao,et al. On Gray-Box Program Tracking for Anomaly Detection , 2004, USENIX Security Symposium.
[19] Hossein Bidgoli. Handbook of Information Security , 2005 .
[20] David A. Wagner,et al. MOPS: an infrastructure for examining security properties of software , 2002, CCS '02.
[21] Michael Schatz,et al. Learning Program Behavior Profiles for Intrusion Detection , 1999, Workshop on Intrusion Detection and Network Monitoring.
[22] R. Sekar,et al. A fast automaton-based method for detecting anomalous program behaviors , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[23] Karl N. Levitt,et al. Automated detection of vulnerabilities in privileged programs by execution monitoring , 1994, Tenth Annual Computer Security Applications Conference.
[24] Somesh Jha,et al. Formalizing sensitivity in static analysis for intrusion detection , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[25] Christopher Krügel,et al. On the Detection of Anomalous System Call Arguments , 2003, ESORICS.
[26] Somesh Jha,et al. Detecting Manipulated Remote Call Streams , 2002, USENIX Security Symposium.
[27] Debin Gao,et al. Gray-box extraction of execution graphs for anomaly detection , 2004, CCS '04.
[28] Wenliang Du,et al. Context Sensitive Anomaly Monitoring of Process Control Flow to Detect Mimicry Attacks and Impossible Paths , 2004, RAID.
[29] Stephanie Forrest,et al. A sense of self for Unix processes , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[30] David A. Wagner,et al. Mimicry attacks on host-based intrusion detection systems , 2002, CCS '02.
[31] Salvatore J. Stolfo,et al. A data mining framework for building intrusion detection models , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[32] Somesh Jha,et al. Automated Discovery of Mimicry Attacks , 2006, RAID.