Argos
- 18 April 2006
- conference paper
- conference paper
- Published by Association for Computing Machinery (ACM)
- Vol. 40 (4), 15-27
- https://doi.org/10.1145/1217935.1217938
Abstract
No abstract availableThis publication has 11 references indexed in Scilit:
- SweetBait: Zero-hour worm detection and containment using low- and high-interaction honeypotsComputer Networks, 2007
- Practical taint-based protection using demand emulationPublished by Association for Computing Machinery (ACM) ,2006
- Towards Software-Based Signature Detection for Intrusion Prevention on the Network CardLecture Notes in Computer Science, 2006
- Minos: Control Data Attack Prevention Orthogonal to Memory ModelPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2005
- VigilantePublished by Association for Computing Machinery (ACM) ,2005
- Experiences Using Minos as a Tool for Capturing and Analyzing Novel Worms for Unknown VulnerabilitiesLecture Notes in Computer Science, 2005
- Secure program execution via dynamic information flow trackingPublished by Association for Computing Machinery (ACM) ,2004
- Randomized instruction set emulation to disrupt binary code injection attacksPublished by Association for Computing Machinery (ACM) ,2003
- Detection of injected, dynamically generated, and obfuscated malicious codePublished by Association for Computing Machinery (ACM) ,2003
- Countering code-injection attacks with instruction-set randomizationPublished by Association for Computing Machinery (ACM) ,2003