[PDF][PDF] Dynamic taint analysis for automatic detection, analysis, and signaturegeneration of exploits on commodity software.

J Newsome, DX Song - NDSS, 2005 - Citeseer
Software vulnerabilities have had a devastating effect on the Internet. Worms such as
CodeRed and Slammer can compromise hundreds of thousands of hosts within hours or …

Systems and methods for detecting and inhibiting attacks using honeypots

S Sidiroglou, AD Keromytis… - US Patent 7,904,959, 2011 - Google Patents
In accordance with some embodiments, systems and methods that protect an application
from attacks are provided. In some embodiments, traffic from a communication network is …

Defending against hitlist worms using network address space randomization

S Antonatos, P Akritidis, EP Markatos… - Proceedings of the …, 2005 - dl.acm.org
Worms are self-replicating malicious programs that represent a major security threat for the
Internet, as they can infect and damage a large number of vulnerable hosts at timescales …

Fast detection of scanning worm infections

SE Schechter, J Jung, AW Berger - … September 15-17, 2004. Proceedings 7, 2004 - Springer
Worm detection and response systems must act quickly to identify and quarantine scanning
worms, as when left unchecked such worms have been able to infect the majority of …

[PDF][PDF] Detecting targeted attacks using shadow honeypots

KG Anagnostakis, S Sidiroglou, P Akritidis, K **nidis… - 2005 - usenix.org
Abstract We present Shadow Honeypots, a novel hybrid architecture that combines the best
features of honeypots and anomaly detection. At a high level, we use a variety of anomaly …

Systems, methods, and media protecting a digital data processing device from attack

S Sidiroglou, AD Keromytis, SJ Stolfo - US Patent 8,407,785, 2013 - Google Patents
US PATENT DOCUMENTS 7,526,758 B2 4/2009 Hasse et al. 7,639,714 B2 12/2009 Stolfo
et al. 7,818,781 B2 10/2010 Golan et al. 7,975,059 B2 7/2011 Wang et al. 8,074,115 B2 …

Automatic runtime error repair and containment via recovery shepherding

F Long, S Sidiroglou-Douskos, M Rinard - ACM SIGPLAN Notices, 2014 - dl.acm.org
We present a system, RCV, for enabling software applications to survive divide-by-zero and
null-dereference errors. RCV operates directly on off-the-shelf, production, stripped x86 …

Flips: Hybrid adaptive intrusion prevention

ME Locasto, K Wang, AD Keromytis… - Recent Advances in …, 2006 - Springer
Intrusion detection systems are fundamentally passive and fail–open. Because their primary
task is classification, they do nothing to prevent an attack from succeeding. An intrusion …

Stability analysis of a SEIQV epidemic model for rapid spreading worms

F Wang, Y Zhang, C Wang, J Ma, SJ Moon - Computers & Security, 2010 - Elsevier
Internet worms have drawn significant attention owing to their enormous threats to the
Internet. Due to the rapid spreading nature of Internet worms, it is necessary to implement …

Methods and systems for repairing applications

AD Keromytis, M Locasto, S Sidiroglou - US Patent 7,490,268, 2009 - Google Patents
Applications may terminate due to any number of threats, program errors, software faults,
attacks, or any other Suitable Software failure. Computer viruses, worms, trojans, hackers …