[PDF][PDF] Dynamic taint analysis for automatic detection, analysis, and signaturegeneration of exploits on commodity software.
J Newsome, DX Song - NDSS, 2005 - Citeseer
Software vulnerabilities have had a devastating effect on the Internet. Worms such as
CodeRed and Slammer can compromise hundreds of thousands of hosts within hours or …
CodeRed and Slammer can compromise hundreds of thousands of hosts within hours or …
Systems and methods for detecting and inhibiting attacks using honeypots
In accordance with some embodiments, systems and methods that protect an application
from attacks are provided. In some embodiments, traffic from a communication network is …
from attacks are provided. In some embodiments, traffic from a communication network is …
Defending against hitlist worms using network address space randomization
Worms are self-replicating malicious programs that represent a major security threat for the
Internet, as they can infect and damage a large number of vulnerable hosts at timescales …
Internet, as they can infect and damage a large number of vulnerable hosts at timescales …
Fast detection of scanning worm infections
SE Schechter, J Jung, AW Berger - … September 15-17, 2004. Proceedings 7, 2004 - Springer
Worm detection and response systems must act quickly to identify and quarantine scanning
worms, as when left unchecked such worms have been able to infect the majority of …
worms, as when left unchecked such worms have been able to infect the majority of …
[PDF][PDF] Detecting targeted attacks using shadow honeypots
Abstract We present Shadow Honeypots, a novel hybrid architecture that combines the best
features of honeypots and anomaly detection. At a high level, we use a variety of anomaly …
features of honeypots and anomaly detection. At a high level, we use a variety of anomaly …
Systems, methods, and media protecting a digital data processing device from attack
US PATENT DOCUMENTS 7,526,758 B2 4/2009 Hasse et al. 7,639,714 B2 12/2009 Stolfo
et al. 7,818,781 B2 10/2010 Golan et al. 7,975,059 B2 7/2011 Wang et al. 8,074,115 B2 …
et al. 7,818,781 B2 10/2010 Golan et al. 7,975,059 B2 7/2011 Wang et al. 8,074,115 B2 …
Automatic runtime error repair and containment via recovery shepherding
We present a system, RCV, for enabling software applications to survive divide-by-zero and
null-dereference errors. RCV operates directly on off-the-shelf, production, stripped x86 …
null-dereference errors. RCV operates directly on off-the-shelf, production, stripped x86 …
Flips: Hybrid adaptive intrusion prevention
ME Locasto, K Wang, AD Keromytis… - Recent Advances in …, 2006 - Springer
Intrusion detection systems are fundamentally passive and fail–open. Because their primary
task is classification, they do nothing to prevent an attack from succeeding. An intrusion …
task is classification, they do nothing to prevent an attack from succeeding. An intrusion …
Stability analysis of a SEIQV epidemic model for rapid spreading worms
F Wang, Y Zhang, C Wang, J Ma, SJ Moon - Computers & Security, 2010 - Elsevier
Internet worms have drawn significant attention owing to their enormous threats to the
Internet. Due to the rapid spreading nature of Internet worms, it is necessary to implement …
Internet. Due to the rapid spreading nature of Internet worms, it is necessary to implement …
Methods and systems for repairing applications
Applications may terminate due to any number of threats, program errors, software faults,
attacks, or any other Suitable Software failure. Computer viruses, worms, trojans, hackers …
attacks, or any other Suitable Software failure. Computer viruses, worms, trojans, hackers …