Check out the new USENIX Web site. next up previous
Next: About this document ... Up: Detecting and Countering System Previous: Conclusion and Future Work

Bibliography

1
J. Balasubramaniyan et al.
An Architecture for Intrusion Detection using Autonomous Agents.
Technical Report TR-98-05, Department of Computer Science, Purdue University, June 1998.

2
T. Bowen, D. Chee, M. Segal, R. Sekar, T. Shanbhag, and P. Uppuluri.
Building survivable systems: An integrated approach based on intrusion detection and damage containment.
Proceedings of the DARPA Information Survivability Conference and Exposition (DISCEX) 2000, 2:84-99, 2000.

3
S. Forrest et al.
A sense of self for unix processes.
In Proceedings of the 1996 Symposium on Security and Privacy, pages 120-128, Oakland, CA, May 6-8 1996.

4
T. Fraser, L. Badger, and Feldman M.
Hardening COTS software with generic software wappers.
In Proceedings of the 1999 Symposium on Security and Privacy, 1999.

5
K. Ilgun, R. Kermmerer, and P. Porras.
State transition analysis: A rule-based intrusion detection approach.
IEEE Transactions on Software Engineering, 21(3):181-199, 1995.

6
C. Kahn et al.
A common intrusion detection framework.
Journal of Computer Security, 1998.

7
C. Ko, G. Fink, and K. Levitt.
Automated Detection of Vulnerabilities in Privileged Programs Using Execution Monitoring.
In Proceedings of the 10th Computer Security Application Conference, Orlando, FL, December 5-9, 1994.

8
C. Ko, M. Ruschitzka, and K. Levitt.
Execution Monitoring of Security-Critical Programs in Distributed Systems: A Specification-Based Approach.
In Proceedings of the 1997 IEEE Symposium on Security and Privacy, Oakland, California, 1997.

9
S. Kumar.
Classification and Detection of Computer Intrusions.
PhD thesis, Department of Computer Science, Purdue University, August 1995.

10
Karen Oostendorp, Christopher Vance, Kelly Djahandari, Benjamin Uecker, and Lee Badger.
Preliminary Wrapper Definition Language Specification.
Technical Report #0684, Trusted Information Systems, Inc., 1997.

11
R. Sekar and P. Uppuluri.
Synthesizing fast intrusion prevention/detection systems from high-level specifications.
Proceedings of the 8th USENIX Security Symposium, pages 63-78, 1999.


Calvin Ko
2000-06-13