參考文獻 |
[1] Yong Tang and Shigang Chen, “Defending Against Internet Worms: A Signature-Based Approach “ IEEE INFOCOM, Miami, FL, March, 2005.
[2] Michele Garetto, Weibo Gong, and Don Towsley, “Modeling Malware Spreading Dynamics “ IEEE INFOCOM, San Francisco, CA, USA, April, 2003.
[3] “On the Effectiveness of Distributed Worm Monitoring “USENIX Security Symposium, 2005
[4] “Automatic Generation of Buffer Overflow Attack Signatures: An Approach Based on Program Behavior Models “Annual Computer Security Applications Conference (ACSAC 2005)
[5] Gaurav Kataria,Gaurav Anand, Rudolph Araujo, Ramayya Krishnan,Adrian Perrig "A Distributed Stealthy Coordination Mechanism for Worm Synchronization",IEEE Securecomm & Workshop, 2006.
[6] Zhenkai Liang, R. Sekar"Fast and automated generation of attack signatures: a basis for building self-protecting servers",Conference on Computer and Communications Security,Proceedings of the 12th ACM conference on Computer and communications security
[7] Randy Smith, Cristian Estan, Somesh Jha"Backtracking Algorithmic Complexity Attacks Against a NIDS ",Annual Computer Security Applications Conference (ACSAC 2006)
[8] “2003 CSI/FBI Computer Crime and Security Survey. Security”,http:// www.reddshell.com/docs/csi_fbi_2003.pdf
[9] “Linux Networking Kernel” http://www.ecsl.cs.sunysb.edu/elibrary/linux/network/LinuxKernel.pdf
[10] H. Shacham, M. Page, B. Pfaff, Eu-Jin Goh, N. Modadugu, and Dan Boneh . “On the Effectiveness of Address-Space Randomization ” Proceedings of the 11th ACM conference on Computer and communications security, 2004
[11] T. Bu, A. Chen, S. V. Wiel, and T. Woo “Design And Evaluation of A Fast And Robust Worm Detection Algorithm” INFOCOM 2006. In the Proceedings of 25th IEEE International Conference on Computer Communications.
[12] D. Moore, C. Shannon, G. M. Voelker, and S. Savage “Internet Quarantine: Requirements for Containing Self-Propagating Code” ,2003
[13] Fu-Hau Hsu, Fanglu Guo, and Tzi-cker Chiueh, “Scalable Network-based Buffer Overflow Attack Detection” in Proceedings of ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS 2006), San Jose, California, USA, December, 2006.
[14] S. Staniford, V. Paxson and N. Weaver “The Top Speed of Flash Worms” In the proceedings of the ACM Workshop on Rapid Malcode (WORM ), Fairfax, VA, Oct. 2004
[15] J. Xu, P. Ning, C. Kil, Y. Zhai, C. Bookholt, "Automatic diagnosis and response to memory corruption vulnerabilities" ACM Conference on Computer Communications Security (CCS 2005)
[16] J. Ma, G. M. Voelker, and Stefan Savage “Self-Stopping Worms” In the proceedings of the ACM Workshop on Rapid Malcode (WORM ), Fairfax, VA, Oct. 2005
[17] Zheng, H., & Duan, H. “Active Technologies to Contain Internet Worm.” Worm blog. Retrieved April 1, 2007, from “wiki.ccert.edu.cn/doc/spark/ActiveTechnologiestoContainInternetWorm.pdf”
[18] N. Weaver, V. Paxson, S. Staniford, and R. Cunningham “A Taxonomy of Computer Worms”, Proceedings of the 2003 ACM workshop on Rapid Malcode, 2003
[19] S. Staniford, V. Paxson and N. Weaver “How To Own The Internet In Your Spare Time” In the Proceedings of USENIX Security Symposium, San Francisco, CA, Aug. 2002
[20] Newsome, J. Karp, B. Song, D. “Polygraph: automatically generating signatures for polymorphic worms”, Security and Privacy, IEEE Symposium , 8-11 May 2005
[21] Costa,M. Crowcroft, J. Castro,M. Rowstron,A. Zhou,L. Zhang,L. Barham,P. “Vigilante: end-to-end containment of internet worms”, ACM Symposium on Operating Systems Principles, 2005
[22] O. Kolesnikov and W. Lee. “Advanced polymorphic worms: Evading IDS by blending in with normal traffic”
[23] Lorenzo Cavallaro, Andrea Lanzi, Luca Mayer and Mattia Monga. “Automated Content-Based Signatures Generator for Zero-day Polymorphic Worms”
[24] Aurora
[25] Z. Chen, L. Gao, and K. Kwiat. “Modeling the Spread of Active Worms”. IEEE INFOCOMM, 2003.
[26] C. Zu, W. Gong, and D. Towsley. “Worm Propagation Modeling and Analysis under Dynamic Quarantine Defense”. In Proceedings of the ACM Workshop on Rapid Malcode (WORM), pages 51–60, 2003.
[27] Kelly Jackson Higgins, Senior Editor, Dark Reading. “Botnets Battle Over Turf” ,April 2007
[28] Kelly Jackson Higgins, Senior Editor, Dark Reading. “Black Hat: Botnets Go One-on-One”, Feb 2007.
[29] C. Cowan, C. Pu, D. Maier, J. Walpole, P. Bakke, S. Beattie, A. Grier, P. Wagle, Q. Zhang, and H. Hinton, “StackGuard: Automatic Adaptive Detection and Prevention of Buffer Overflow Attacks,” USENIX Security Conference, San Antonio, Texas, Jan.1998.
[30] Ali Rahbar , “An analysis of Microsoft Windows Vista’s ASLR”, Oct 2006.
[31] C. Zou, W. Gong, and D. Towsley. Code RedWorm Propagation Modeling and Analysis. In Proceedings of ACM Conference on Computer and Communication Security (CCS), pages 138–147, 2002.
[32] H.W. Hethcote. The Mathematics of Infectious Diseases. In SIAM Reviews, Vol. 42 No. 4, 2000.
[33] G. Gu, M. Sharif, X. Qin, D. Dagon, W. Lee, and G. Riley. Worm Detection, Early Warning and Response Based on Local Victim Information. In Proceedings of 20th Annual Computer Security Applications Conference, December 2004
[34] P. Barford and V. Yegneswaran, “An inside look at botnets,” in Special Workshop on Malware Detection, Advances in Information Security, 2006.
[35] J. Stewart, “Storm worm DDoS attack.” http://www.secureworks.com/research/threats/ view.html?threat=storm-worm, February 2007.
[36] Sumeet Singh, Cristian Estanm, George Varghese, Stefan Savage, “Automated Worm Fingerprinting”, 6th Symposium on Operating Systems Design and Implementation, 2004
[37] Hovav Shacham, "The Geometry of Innocent Flesh on the Bone: Return-into-libc without Function Calls (on the x86)", 14th ACM Conference on Computer and Communications Security (October 2007)
[38] Z. Liang and R. Sekar, ``Fast and Automated Generation of Attack Signatures: A Basis for Building Self-Protecting Servers,’’ In Proceedings of the 12th ACM Conference on Computer and Communications Security, November 2005.
[39] Bulba and Kil3r, “Bypassing StackGuard and StackShield”. http://www.phrack.org/issues.html?issue=56&id=5
[40] S. Bhatkar, D. DuVarney, and R. Sekar “Address Obfuscation: An Efficient Approach to Combat a Broad Range of Memory Error Exploits,” Proc. 12th USENIX Sec. Symp, USENIX, Aug. 2003.
[41] StackShield. http://www.angelfire.com/sk/stackshield
[42] H.-A. Kim and B. Karp, ``Autograph: Toward Automated, Distributed Worm Signature Detection,’’ In Proceedings of the 13th USENIX Security Symposium, August 2004.
[43] Zheng H, Duan HX, “Active Defense System to Contain Internet Worm. XCON 2004”, Beijing
[44] Alexey Smirnov, Tzi-cker Chiueh, “Automatic Patch Generation for Buffer Overflow Attacks“, IAS 2007
[45] Weidong Cui, Marcus Peinado, Helen J. Wang, Michael E. Locasto, “ShieldGen Automatic Data Patch Generation for Unknown Vulnerabilities with Informed Probing“, Security and Privacy, 2007. SP '07. IEEE Symposium on |