11.07.2015 Views

syssec_red_book

syssec_red_book

syssec_red_book

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Bibliography[309] E. Passerini, R. Paleari, L. Martignoni, and D. Bruschi. Fluxor: Detecting and monitoringfast-flux service networks. In D. Zamboni, editor, DIMVA, volume 5137 of Lecture Notes inComputer Science, pages 186–206. Springer, 2008.[310] PaX Team. Address space layout randomization. http://pax.grsecurity.net/docs/aslr.txt.[311] PaX Team. PaX non-executable pages design & implementation. http://pax.grsecurity.net/docs/noexec.txt.[312] H. Peng, C. Gates, B. Sarma, N. Li, Y. Qi, R. Potharaju, C. Nita-Rotaru, and I. Molloy. Usingprobabilistic generative models for ranking risks of android apps. In CCS, 2012.[313] C. Percival. Stronger key derivation via sequential memory-hard functions. BSDCan 2009,2009.[314] L. Piètre-Cambacédès, M. Tritschler, and G. N. Ericsson. Cybersecurity Myths on PowerControl Systems: 21 Misconceptions and False Beliefs. Power Delivery, IEEE Transactions on,26(1), 2011.[315] M. Pistoia, S. Chandra, S. J. Fink, and E. Yahav. A survey of static analysis methods foridentifying security vulnerabilities in software systems. IBM Syst. J., 46(2):265–288, Apr.2007.[316] PITAC. Cyber Security: A Crisis of Prioritization. Technical report, President’s InformationTechnology Advisory Committee - PITAC, Feb. 2005.[317] I. Polakis, G. Kontaxis, S. Antonatos, E. Gessiou, T. Petsas, and E. P. Markatos. Using socialnetworks to harvest email addresses. In Proceedings of the 9th Annual ACM Workshop onPrivacy in the Electronic Society, pages 11–20. ACM, 2010.[318] I. Polakis, M. Lancini, G. Kontaxis, F. Maggi, S. Ioannidis, A. D. Keromytis, and S. Zanero.All your face are belong to us. In Proceedings of the 28th Annual Computer Security ApplicationsConference on - ACSAC ’12, page 399. ACM Press, 2012.[319] P. Porras, H. Saidi, and V. Yegneswaran. An analysis of conficker’s logic and rendezvouspoints. Technical Report SRI International Technical Report, 2009. http://mtc.sri.com/Conficker.[320] G. Portokalidis, A. Slowinska, and H. Bos. Argos: an Emulator for Fingerprinting Zero-DayAttacks. In Proceedings of the 1st ACM SIGOPS/EuroSys European Conference on ComputerSystems 2006, EuroSys’06, 2006.[321] M. Prasad and T. cker Chiueh. A binary rewriting defense against stack based overflowattacks. In Proceedings of the USENIX Annual Technical Conference, June 2003.[322] R. W. Proctor, M.-C. Lien, K.-P. L. Vu, E. E. Schultz, and G. Salvendy. Improving computersecurity for authentication of users: influence of proactive password restrictions. Behav ResMethods Instrum Comput, 34(2):163–9, 2002.[323] N. Provos and D. Mazières. A future-adaptive password scheme. ATEC 1999.[324] S. J. Prowell, M. Pleszkoch, K. D. Sayre, and R. C. I. S. G. T. I. . I. P. Linger. Automatedvulnerability detection for compiled smart grid software. Innovative Smart Grid Technologies(ISGT), 2012 IEEE PES, 2012.[325] F. Qin, C. Wang, Z. Li, H.-s. Kim, Y. Zhou, and Y. Wu. LIFT: A Low-Overhead PracticalInformation Flow Tracking System for Detecting Security Attacks. In Proc. of MICRO, pages135–148, 2006.[326] C. Queiroz, A. Mahmood, and Z. S. G. I. T. o. Tari. SCADASim—A Framework for BuildingSCADA Simulations. Smart Grid, IEEE Transactions on, 2(4), 2011.[327] M. Raciti and S. Nadjm-Tehrani. Embedded Cyber-Physical Anomaly Detection in SmartMeters. 2012.[328] R. Radvanovsky and J. Brodsky. Hand<strong>book</strong> of Scada/Control Systems Security. CRC PressI Llc,Feb. 2013.180

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!