References
- Malicious Mobile Code R. Grimes
- 바이러스 정보 보기-Win32-Nimda 안철수 연구소
- 바이러스 정보 보기-JS/Spida 안철수 연구소
- 바이러스 정보 보기-JS/Exploit.Messenger 안철수 연구소
- The 'stacheldraht' distributed denial of service attack tool David Dittrich
- Securing Java G. McGraw;E. Felton
- A Collection of Increasingly Hostile Applets M. LaDue
- Enhancing E-Mail Security With Procmailthe E-mail Sanitizer J.. Hardin
- Infex-Unix Mail Server Scanner PLDaniels
- white paper InterScan AppletTrap: Eliminating Malicious Mobile Code Trend Micro
- Xamime : Content control - policy enforcement Xamime
- Symantec White Paper Series v.XXXIV Understanding heuristics symantec's bloodhound technology Symantec
- proc. of the IEEE Symposium on Security and Privacy Improving Computer Security using Extended Static Checking B. Chess
- Computers & Security v.14 no.6 MCF: a Malicious Code Filter R. W. Lo;K. N. Levitt;R.A. Olsson
- Virus Bulletin Conference Heuristic Engines F. Fernandeez
- proc. of the IEEE symposium on Security and Privacy Data Mining Method for Detection of New Malicious Executables M. Schultz(et al.)
- Software Practice and Experience Bytecode Verification on Java Smart Card X. Leroy
- proc. of the IEEE Symposium on Security and Privacy Flexible Policy-Directed Code Safety D. Evans
- USA patent Computer Network malicious code scanner Trend Micro
- proc. of New Security Paradigms Workshop (NSPW'01) Model-Carrying Code (MCC): A New Paradigm for Mobile-Code Security R. Sekar(et al.)
- proc. of the 6th ACISP SKETHIC : Secure Kernel Extension against Trojan Horses with Information-carrying Codes E. S. Cho(et al.)
- Proc. of the Second Symposium on Operating Systems Design and Implementation (OSDI96) Safe Kernel Extensions Without Run-Time Checking G.C. Necula;P. Lee
- Proc. of the Annual Computer Security Application Conference (ACSAC97) Using Kernel Hypervisors to Secure Applications T. Mitchem;R. Lu;R. OBrien
- Proc. of the 10th Annual Computer Security Applications Conference Automated Detection of Vulnerabilities in Privileged Programs by Execution Monitoring C. Ko;G. Fink;K. Levitt
- proc. of the 3rd USENIX Windows NT Symposium Detours: Binary Interception of Win32 Functions Hunt, Galen
- Java Security S. Oaks
- proc. of the IEEE Symposium on Security and Privacy Secure Execution of Java Applets using a Remote Playground D. Malkhi(et al.)
- Techbnical Report, TR98-1664 Enforceable Security Policies F. Schneider
- Corba Security B. Blakley
- proc. of the 16th Annual Computer Security Applications Conference (ACSAC'00) ITS4: A static vulnerability scanner for C and C++ code J. Viega(et al.)