共 16 条
[1]
Experiences using Minos as a tool for capturing and analyzing novel worms for unknown vulnerabilities. Crandall J.R,Wu S.F,Chong F.T. Proceedings of the GI SIG SIDAR Conference on Detection of Intrusions and Malware and Vulnerability Assessment . 2005
[2]
Identification of common molecular subsequences. RT Smith,MS Waterman. Journal of Molecular Biology . 1981
[3]
A general method applicable to the search for similarities in the amino acid sequences. SB Needleman,CD Wunsch. Journal of Molecular Biology . 1970
[4]
Defending against internet worms: A signature-based approach. Tang Y,Chen S. Proceedings of IEEE INFOCOM’05 . 2005
[5]
An architecture for generat-ing semantic-aware signatures. Yegneswaran V,Giffin J,Barford P,et al. USENIX Security Symposium . 2005
[6]
Polymorphic shellcode engine using spectrum analysis. Detristan T,Ulenspiegel T,Malcom Y,Underduk M.V. PhrackOnline Magazine . 2003
[7]
Automatic di-agnosis and response to memory corruption vulnerabilities. Xu J,Ning P,Kil C,Zhai Y,Bookholt C. Proceedings of the ACM CCS 2005 . 2005
[8]
Onderiving unknown vulnerabilities from ZeroDay polymorphicand metamorphic worm exploits. Crandall J.R,Su Zhen-Dong,Wu S.F,Chong F.T. Proceedings of the ACMCCS 2005 . 2005
[9]
Polygraph:Automaticallygenerating signatures for polymorphic worms. Newsome J,Karp B,Song D. Proceedingsof the IEEE S&P 2005 . 2005
[10]
Automatedworm fingerprinting. Singh S,Estan C,Varghese G,Savage S. Proceedings of the 6th ACM/USE-NIX Symposium on Operating System Design and Implementa-tion(OSDI) . 2004