Bibliography


1
Computer emergency response team (cert).
http://www.cert.org.

2
The metasploit project.
http://www.metasploit.com.

3
Ramkumar Chinchani and Eric Van Den Berg.
A fast static analysis approach to detect exploit code inside network flows.
In RAID, 2005.

4
C. Kruegel, E. Kirda, D. Mutz, W. Robertson, and G. Vigna.
Polymorphic worm detection using structural information of executables.
In RAID, 2005.

5
Michalis Polychronakis, Kostas G. Anagnostakis, and Evangelos P. Markatos.
Network-level polymorphic shellcode detection using emulation.
In DIMVA, 2006.

6
Xinran Wang, Chi-Chun Pan, Peng Liu, and Sencun Zhu.
Sigfree: A signature-free buffer overflow attack blocker.
In 15th Usenix Security Symposium, July 2006.



xinran wang 2008-02-28