Y.-M. Wang, D. Beck, X. Jiang, R. Roussev, C.
Verbowski, S. Chen, and S. T. King. Automated Web Patrol with Strider
HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities. In NDSS, 2006.
T. Garfinkel and M. Rosenblum. A
Virtual Machine Introspection Based Architecture for Intrusion Detection. In NDSS,
2003.
J. Caballero, H. Yin, Z. Liang,
and D. Song. Polyglot: Automatic Extraction of Protocol Message Format using
Dynamic Binary Analysis. In CCS, 2007.
SEAGATE CORPORATION. Drivetrust
technology: A technical overview.
http://www.seagate.com/docs/pdf/whitepaper/TP564DriveTrust Oct06.pdf.
NATIONAL CONFERENCE OF STATE LEGISLATURES. State
security breach notification laws. http://www.ncsl.org/programs/lis/cip/priv/breachlaws.htm,
Jan. 2008.
CHOW, J., PFAFF, B., GARFINKEL, T., AND ROSENBLUM,
M. Shredding your garbage: Reducing data lifetime through secure deallocation.
In Proc. 14th USENIX Security Symposium (Aug. 2005), pp. 331–346.
S. Son, K. S. McKinley, and V.
Shmatikov. Rolecast: finding missing security checks when you do not know what
checks are. In ACM SIGPLAN Notices, volume 46, pages 1069–1084. ACM, 2011.
V. Felmetsger, L. Cavedon, C.
Kruegel, and G. Vigna. Toward automated detection of logic vulnerabilities in
web applications. In USENIX Security Symposium, 2010.
B. Adida, A. Barth, and C.
Jackson. Rootkits for javascript environments. In Proc. of WOOT 2009,
2009.
No comments:
Post a Comment