Defending against hitlist worms using network address space randomization
- 11 November 2005
- proceedings article
- Published by Association for Computing Machinery (ACM)
Abstract
No abstract availableKeywords
This publication has 26 references indexed in Scilit:
- Exploiting the IPID Field to Infer Network Path and End-System CharacteristicsPublished by Springer Nature ,2005
- An analysis of TCP reset behaviour on the internetACM SIGCOMM Computer Communication Review, 2005
- MobiDeskPublished by Association for Computing Machinery (ACM) ,2004
- ShieldPublished by Association for Computing Machinery (ACM) ,2004
- Accurate, scalable in-network identification of p2p traffic using application signaturesPublished by Association for Computing Machinery (ACM) ,2004
- Fast Detection of Scanning Worm InfectionsPublished by Springer Nature ,2004
- Countering code-injection attacks with instruction-set randomizationPublished by Association for Computing Machinery (ACM) ,2003
- Inside the Slammer wormIEEE Security & Privacy, 2003
- Code-RedPublished by Association for Computing Machinery (ACM) ,2002
- Sharing and protection in a single-address-space operating systemACM Transactions on Computer Systems, 1994