Documents Related by Co-Citation

299 Autograph: Toward automated, distributed worm signature detection – Hyang-ah Kim - 2004
163 Honeycomb - Creating Intrusion Detection Signatures Using Honeypots – Christian Kreibich, Jon Crowcroft - 2003
271 Automated worm fingerprinting – Sumeet Singh, Cristian Estan, George Varghese, Stefan Savage - 2004
481 Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software – James Newsome, Dawn Song - 2005
159 Shield: Vulnerability-Driven Network Filters for Preventing Known Vulnerability Exploits – Helen J. Wang, Helen J. Wang, Chuanxiong Guo, Chuanxiong Guo, Daniel R. Simon, Daniel R. Simon, Alf Zugenmaier, Alf Zugenmaier - 2004
199 Anomalous payload-based network intrusion detection – Ke Wang, Salvatore J. Stolfo - 2004
213 Address obfuscation: an efficient approach to combat a broad range of memory error exploits – Eep Bhatkar, Daniel C. Duvarney, R. Sekar - 2003
84 On Deriving Unknown Vulnerabilities from Zero-Day Polymorphic and Metamorphic Worm Exploits – Jedidiah R. Crandall, Zhendong Su - 2005
89 Fast and Automated Generation of Attack Signatures: A Basis for Building Self-Protecting Servers – Zhenkai Liang, R. Sekar - 2005
86 Building a Reactive Immune System for Software Services – Stelios Sidiroglou, Michael E. Locasto, Stephen W. Boyd, Angelos D. Keromytis - 2004
483 How to 0wn the Internet in Your Spare Time – Stuart Staniford, Vern Paxson, Nicholas Weaver - 2002
86 Accurate buffer overflow detection via abstract payload execution – Thomas Toth, Christopher Kruegel - 2002
53 Advanced Polymorphic Worms: Evading IDS by Blending in with Normal Traffic – Oleg Kolesnikov, David Dagon, Wenke Lee - 2004
59 Polymorphic Shellcode Engine Using Spectrum Analysis. Phrack Issue 0x3d – T Detristan, T Ulenspiegel, Y Malcom, M Underduk - 2003
51 Defending against internet worms: A signature-based approach – Yong Tang, Shigang Chen - 2005
244 Vigilante: End-to-End Containment of Internet Worm Epidemics – Manuel Costa, Jon Crowcroft, Miguel Castro, Antony Rowstron, Lidong Zhou, Lintao Zhang, Paul Barham - 2008
821 Snort - Lightweight Intrusion Detection for Networks – Martin Roesch, Stanford Telecommunications - 1999
82 Hunting for metamorphic – Péter Ször, Peter Ferrie - 2001
49 Automatic Diagnosis and Response to Memory Corruption Vulnerabilities – Jun Xu, Peng Ning, Chongkyung Kil, Yan Zhai, Chris Bookholt - 2005