Synthesizing Fast Intrusion Prevention/Detection Systems from High-Level Specifications R. Sekar, P. Uppuluri, USENIX '99 cite
Intrusion Detection Using Variable-Length Audit Trail Patterns Andreas Wespi, Marc Dacier, Hervé Debar, RAID '00 cite, abstract, paper
Intrusion Detection via Static Analysis David Wagner, Drew Dean, IEEE Oakland '01 cite
Mimicry Attacks on Host-Based Intrusion Detection Systems David Wagner, Paolo Soto, ACM CCS '02 cite
Mitigating Buffer Overflows By Operating System Randomization Monica Chew, Dawn Song, CMU Technical Report '02 paper
Anomaly Detection Using Call Stack Information Henry Hanping Feng, Oleg M. Kolesnikov, Prahlad Fogla, Wenke Lee, Weibo Gong, IEEE Oakland '03 cite
Cassyopia: Compiler Assisted System Optimization Mohan Rajagopalan, Saumya K. Debray, Matti A. Hiltunen, Richard D. Schlichting, HotOS '03 abstract, paper
LOMAC: MAC You Can Live With Timothy Fraser, Freenix '01 paper
Managing access control policies using access control spaces Trent Jaeger, Antony Edwards, Xiaolan Zhang, ACM SACMAT '02 paper
Linux Security Modules: General Security Support for the Linux Kernel Chris Wright, Crispin Cowan, James Morris, USENIX Security '02 cite
Specification-based anomaly detection: a new approach for detecting network intrusions R. Sekar, A. Gupta, J. Frullo, ACM CCS '02 paper
Model-Carrying Code: A Practical Approach for Safe Execution of Untrusted Applications R. Sekar, V.N. Venkatakrishnan, Samik Basu, Sandeep Bhatkar, Daniel C. DuVarney, ACM SOSP '03 paper
Terra: A Virtual-Machine Based Platform for Trusted Computing Tal Garfinkel, Ben Pfaff, Jim Chow, Mendel Rosenblum, Dan Boneh, ACM SOSP '03 paper