Hamsa: fast signature generation for zero-day polymorphic worms with provable attack resilience
暂无分享,去创建一个
Ming-Yang Kao | Yan Chen | Zhichun Li | Manan Sanghi | Brian Chavez | Manan Sanghi | Zhichun Li | M. Kao | Yan Chen | Brian Chavez
[1] Zhenkai Liang,et al. Fast and automated generation of attack signatures: a basis for building self-protecting servers , 2005, CCS '05.
[2] Wenke Lee,et al. Misleading worm signature generators using deliberate noise injection , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[3] Christopher Krügel,et al. Polymorphic Worm Detection Using Structural Information of Executables , 2005, RAID.
[4] Vern Paxson,et al. Bro: a system for detecting network intruders in real-time , 1998, Comput. Networks.
[5] Somesh Jha,et al. Semantics-aware malware detection , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[6] Yong Tang,et al. Defending against Internet worms: a signature-based approach , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[7] Boundary detection in tokenizing network application payload for anomaly detection , 2003 .
[8] B. Karp,et al. Autograph: Toward Automated, Distributed Worm Signature Detection , 2004, USENIX Security Symposium.
[9] Somesh Jha,et al. An architecture for generating semantics-aware signatures , 2005 .
[10] Guofei Gu,et al. Measuring intrusion detection capability: an information-theoretic approach , 2006, ASIACCS '06.
[11] Jens Stoye,et al. An incomplex algorithm for fast suffix array construction , 2007, ALENEX/ANALCO.
[12] Somesh Jha,et al. An Architecture for Generating Semantic Aware Signatures , 2005, USENIX Security Symposium.
[13] James Newsome,et al. Polygraph: automatically generating signatures for polymorphic worms , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[14] Vern Paxson,et al. How to Own the Internet in Your Spare Time , 2002, USENIX Security Symposium.
[15] James Newsome,et al. Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software , 2005, NDSS.
[16] George Varghese,et al. Automated Worm Fingerprinting , 2004, OSDI.
[17] Mikkel Thorup,et al. String Matching in Lempel—Ziv Compressed Strings , 1998, Algorithmica.
[18] George Varghese,et al. Deterministic memory-efficient string matching algorithms for intrusion detection , 2004, IEEE INFOCOM 2004.
[19] Jon Crowcroft,et al. Honeycomb , 2004, Comput. Commun. Rev..
[20] Giovanni Manzini,et al. Engineering a Lightweight Suffix Array Construction Algorithm , 2002, ESA.
[21] Salvatore J. Stolfo,et al. Anomalous Payload-Based Worm Detection and Signature Generation , 2005, RAID.
[22] Zhendong Su,et al. On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits , 2005, CCS '05.
[23] Salvatore J. Stolfo,et al. Anomalous Payload-Based Network Intrusion Detection , 2004, RAID.
[24] Enno Ohlebusch,et al. Replacing suffix trees with enhanced suffix arrays , 2004, J. Discrete Algorithms.
[25] Daniel C. DuVarney,et al. Address Obfuscation: An Efficient Approach to Combat a Broad Range of Memory Error Exploits , 2003, USENIX Security Symposium.
[26] Alfred V. Aho,et al. Efficient string matching , 1975, Commun. ACM.