Publications

  2013 (22)
Safe and Automatic Live Update for Operating Systems. Giuffrida, C.; Kuijsten, A.; and Tanenbaum, A. S. In ASPLOS, December 2013.
Safe and Automatic Live Update for Operating Systems [pdf]Paper   bibtex
Dowsing for Overflows: A Guided Fuzzer to Find Buffer Boundary Violations. Haller, I.; Slowinska, A.; Neugschwandtner, M.; and Bos, H. In USENIX Security, December 2013.
Dowsing for Overflows: A Guided Fuzzer to Find Buffer Boundary Violations [pdf]Paper   bibtex
P2PWNED — Modeling and Evaluating the Resilience of Peer-to-Peer Botnets. Rossow, C.; Andriesse, D.; Werner, T.; Stone-Gross, B.; Dietrich, C. J.; and Bos, H. In S&P, December 2013.
P2PWNED — Modeling and Evaluating the Resilience of Peer-to-Peer Botnets [pdf]Paper   bibtex
When Slower is Faster: On Heterogeneous Multicores for Reliable Systems. Hruby, T.; Bos, H.; and Tanenbaum, A. S. In USENIX ATC, November 2013.
When Slower is Faster: On Heterogeneous Multicores for Reliable Systems [pdf]Paper   bibtex
Scalable Virtual Machine Deployment Using VM Image Caches. Razavi, K.; and Kielmann, T. In SC, October 2013.
Scalable Virtual Machine Deployment Using VM Image Caches [pdf]Paper   bibtex
Practical Automated Vulnerability Monitoring Using Program State Invariants. Giuffrida, C.; Cavallaro, L.; and Tanenbaum, A. S. In DSN, October 2013.
Practical Automated Vulnerability Monitoring Using Program State Invariants [pdf]Paper   bibtex
Back to the Future: Fault-tolerant Live Update with Time-traveling State Transfer. Giuffrida, C.; Iorgulescu, C.; Kuijsten, A.; and Tanenbaum, A. S. In LISA, October 2013.
Back to the Future: Fault-tolerant Live Update with Time-traveling State Transfer [pdf]Paper   bibtex
Reducing VM Startup Time and Storage Costs by VM Image Content Consolidation. Razavi, K.; Razorea, L. M.; and Kielmann, T. In DIHC, September 2013.
Reducing VM Startup Time and Storage Costs by VM Image Content Consolidation [pdf]Paper   bibtex
LigRE: Reverse-Engineering of Control and Data Flow Models for Black-Box XSS Detection. Duchene, F.; Rawat, S.; Richier, J.; and Groz, R. In WCRE, September 2013.
LigRE: Reverse-Engineering of Control and Data Flow Models for Black-Box XSS Detection [pdf]Paper   bibtex
Evolving Indigestible Codes: Fuzzing Interpreters with Genetic Programming. Rawat, S.; Duchene, F.; Groz, R.; and Richier, J. In CICS, September 2013.
Evolving Indigestible Codes: Fuzzing Interpreters with Genetic Programming [link]Paper   bibtex
A Stack Model for Symbolic Buffer Overflow Exploitability Analysis. Grieco, G.; Mounier, L.; Potet, M.; and Rawat, S. In ICSTW, September 2013.
A Stack Model for Symbolic Buffer Overflow Exploitability Analysis [pdf]Paper   bibtex
EDFI: A Dependable Fault Injection Tool for Dependability Benchmarking Experiments. Giuffrida, C.; Kuijsten, A.; and Tanenbaum, A. S. In PRDC, September 2013.
EDFI: A Dependable Fault Injection Tool for Dependability Benchmarking Experiments [pdf]Paper   bibtex
Unprivileged Black-Box Detection of User-Space Keyloggers. Ortolani, S.; Giuffrida, C.; and Crispo, B. TDSC, 10(1). September 2013.
Unprivileged Black-Box Detection of User-Space Keyloggers [pdf]Paper   bibtex
Who Allocated My Memory? Detecting Custom Memory Allocators in C Binaries. Chen, X.; Slowinska, A.; and Bos, H. In WCRE, September 2013.
Who Allocated My Memory? Detecting Custom Memory Allocators in C Binaries [pdf]Paper   bibtex
MemPick: Data Structure Detection in C/C++ Binaries. Haller, I.; Slowinska, A.; and Bos, H. In WCRE, September 2013.
MemPick: Data Structure Detection in C/C++ Binaries [pdf]Paper   bibtex
Highly Resilient Peer-to-Peer Botnets Are Here: An Analysis of Gameover Zeus. Andriesse, D.; Rossow, C.; Stone-Gross, B.; Plohmann, D.; and Bos, H. In MALWARE, September 2013.
Highly Resilient Peer-to-Peer Botnets Are Here: An Analysis of Gameover Zeus [pdf]Paper   bibtex
Techniques for Efficient In-Memory Checkpointing. Vogt, D.; Giuffrida, C.; Bos, H.; and Tanenbaum, A. S. In HotDep, September 2013.
Techniques for Efficient In-Memory Checkpointing [pdf]Paper   bibtex
Combining Static and Dynamic Analysis for Vulnerability Detection. Rawat, S.; Ceara, D.; Mounier, L.; and Potet, M. Technical Report August 2013.
Combining Static and Dynamic Analysis for Vulnerability Detection [link]Paper   bibtex
Fuzzing Intelligent de XSS Type-2 Filtrés selon Darwin: KameleonFuzz. Duchene, F.; Rawat, S.; Richier, J.; Groz, R.; and others In SSTIC, August 2013.
Fuzzing Intelligent de XSS Type-2 Filtrés selon Darwin: KameleonFuzz [link]Paper   bibtex
A Hesitation Step into the Blackbox: Heuristic Based Web-Application Reverse-Engineering. Duchene, F.; Rawat, S.; Richier, J.; and Groz, R. In NSC, August 2013.
A Hesitation Step into the Blackbox: Heuristic Based Web-Application Reverse-Engineering [link]Paper   bibtex
ConPaaS: An Integrated Runtime Environment for Elastic Cloud Applications. Pierre, G.; Kielmann, T.; Rocca, E.; Razavi, K; IJff, B.; Fernandez, H.; Figueiredo, R.; Uta, A.; Vintila, A.; Oprescu, A.; Schuett, T.; Berlin, M.; Artac, M.; and Cernivec, A. In HPDC (poster), August 2013.
ConPaaS: An Integrated Runtime Environment for Elastic Cloud Applications [pdf]Paper   bibtex
Dynamic Analysis of Android Malware. van der Veen, V.; Bos, H.; and Rossow, C. Ph.D. Thesis, August 2013.
Dynamic Analysis of Android Malware [pdf]Paper   bibtex
  2012 (10)
Enhanced Operating System Security Through Efficient and Fine-grained Address Space Randomization. Giuffrida, C.; Kuijsten, A.; and Tanenbaum, A. S. In USENIX Security, December 2012.
Enhanced Operating System Security Through Efficient and Fine-grained Address Space Randomization [pdf]Paper   bibtex
Prudent Practices for Designing Malware Experiments: Status Quo and Outlook. Rossow, C.; Dietrich, C. J.; Grier, C.; Kreibich†, C.; Paxson†, V.; Pohlmann, N.; Bos, H.; and Steen, M. v. In S&P, December 2012.
Prudent Practices for Designing Malware Experiments: Status Quo and Outlook [pdf]Paper   bibtex
Body Armor for Binaries: Preventing Buffer Overflows Without Recompilation. Slowinska, A.; Stancescu, T.; and Bos, H. In USENIX ATC, November 2012.
Body Armor for Binaries: Preventing Buffer Overflows Without Recompilation [pdf]Paper   bibtex
Memory Errors: The Past, the Present, and the Future. van der Veen, V.; Dutt-Sharma, N.; Cavallaro, L.; and Bos, H. In RAID, October 2012.
Memory Errors: The Past, the Present, and the Future [pdf]Paper   bibtex
Keep Net Working - On a Dependable and Fast Networking Stack. Hruby, T.; Vogt, D.; Bos, H.; and Tanenbaum, A. S. In DSN, October 2012.
Keep Net Working - On a Dependable and Fast Networking Stack [pdf]Paper   bibtex
XSS Vulnerability Detection Using Model Inference Assisted Evolutionary Fuzzing. Duchene, F.; Groz, R.; Rawat, S.; and Richier, J. In ICST, September 2012.
XSS Vulnerability Detection Using Model Inference Assisted Evolutionary Fuzzing [pdf]Paper   bibtex
Finding Buffer Overflow Inducing Loops in Binary Executables. Rawat, S.; and Mounier, L. In SERE, September 2012.
Finding Buffer Overflow Inducing Loops in Binary Executables [pdf]Paper   bibtex
Memoirs of a Browser: A Cross-browser Detection Model for Privacy-breaching Extensions. Giuffrida, C.; Ortolani, S.; and Crispo, B. In ASIACCS, September 2012.
Memoirs of a Browser: A Cross-browser Detection Model for Privacy-breaching Extensions [pdf]Paper   bibtex
Safe and Automated State Transfer for Secure and Reliable Live Update. Giuffrida, C.; and Tanenbaum, A. In HotSwUp, September 2012.
Safe and Automated State Transfer for Secure and Reliable Live Update [pdf]Paper   bibtex
System-level Support for Intrusion Recovery. Bacs, A.; Vermeulen, R.; Slowinska, A.; and Bos, H. In DIMVA, September 2012.
System-level Support for Intrusion Recovery [pdf]Paper   bibtex
  2011 (8)
Application-Tailored I/O with Streamline. de Bruijn, W.; Bos, H.; and Bal, H. TOCS, 29(2): 6:1–6:33. December 2011.
Application-Tailored I/O with Streamline [pdf]Paper   bibtex
Howard: A Dynamic Excavator for Reverse Engineering Data Structures. Slowinska, A.; Stancescu, T.; and Bos, H. In NDSS, November 2011.
Howard: A Dynamic Excavator for Reverse Engineering Data Structures [pdf]Paper   bibtex
KLIMAX: Profiling Memory Write Patterns to Detect Keystroke-harvesting Malware. Ortolani, S.; Giuffrida, C.; and Crispo, B. In RAID, October 2011.
KLIMAX: Profiling Memory Write Patterns to Detect Keystroke-harvesting Malware [pdf]Paper   bibtex
Minemu: The World's Fastest Taint Tracker. Bosman, E.; Slowinska, A.; and Bos, H. In RAID, October 2011.
Minemu: The World's Fastest Taint Tracker [pdf]Paper   bibtex
A Heuristic Approach to Author Name Disambiguation in Bibliometrics Databases for Large-scale Research Assessments. D'Angelo, C. A.; Giuffrida, C.; and Abramo, G. JASIST, 62(2). September 2011.
A Heuristic Approach to Author Name Disambiguation in Bibliometrics Databases for Large-scale Research Assessments [pdf]Paper   bibtex
Offset-Aware Mutation Based Fuzzing for Buffer Overflow Vulnerabilities: Few Preliminary Results. Rawat, S.; and Mounier, L. In ICSTW, September 2011.
Offset-Aware Mutation Based Fuzzing for Buffer Overflow Vulnerabilities: Few Preliminary Results [pdf]Paper   bibtex
On Botnets that Use DNS for Command and Control. Dietrich, C. J.; Rossow, C.; Freiling, F. C.; Bos, H.; Steen, M. v.; and Pohlmann, N. In EC2ND, September 2011.
On Botnets that Use DNS for Command and Control [pdf]Paper   bibtex
System Security at VU University Amsterdam. Bos, H.; Cavallaro, L.; and Tanenbaum, A. S. In SysSec Workshop, August 2011.
System Security at VU University Amsterdam [pdf]Paper   bibtex
  2010 (9)
Bait Your Hook: A Novel Detection Technique for Keyloggers. Ortolani, S.; Giuffrida, C.; and Crispo, B. In RAID, October 2010.
Bait Your Hook: A Novel Detection Technique for Keyloggers [pdf]Paper   bibtex
Paranoid Android: Versatile Protection For Smartphones. Portokalidis, G.; Homburg, P.; Anagnostakis, K.; and Bos, H. In ACSAC, October 2010.
Paranoid Android: Versatile Protection For Smartphones [pdf]Paper   bibtex
An Evolutionary Computing Approach for Hunting Buffer Overflow Vulnerabilities: A Case of Aiming in Dim Light. Rawat, S.; and Mounier, L. In EC2ND, September 2010.
An Evolutionary Computing Approach for Hunting Buffer Overflow Vulnerabilities: A Case of Aiming in Dim Light [pdf]Paper   bibtex
We Crashed, Now What?. Giuffrida, C.; Cavallaro, L.; and Tanenbaum, A. S In HotDep, September 2010.
We Crashed, Now What? [pdf]Paper   bibtex
Pointer Tainting Still Pointless: (But We All See the Point of Tainting). Slowinska, A.; and Bos, H. OSR, 44(3): 88–92. September 2010.
Pointer Tainting Still Pointless: (But We All See the Point of Tainting) [pdf]Paper   bibtex
DDE: Dynamic Data Structure Excavation. Slowinska, A.; Stancescu, T.; and Bos, H. In APSYS, September 2010.
DDE: Dynamic Data Structure Excavation [pdf]Paper   bibtex
A Gossip-based Churn Estimator for Large Dynamic Networks. Giuffrida, C.; and Ortolani, S. In ASCI, August 2010.
A Gossip-based Churn Estimator for Large Dynamic Networks [pdf]Paper   bibtex
MINIX 3: Status Report and Current Research. Tanenbaum, A. S.; Appuswamy, R.; Bos, H.; Cavallaro, L.; Giuffrida, C.; Hrubỳ, T.; Herder, J.; and van der Kouwe, E. ;login, 35(3). August 2010.
MINIX 3: Status Report and Current Research [pdf]Paper   bibtex
A Taxonomy of Live Updates. Giuffrida, C.; and Tanenbaum, A. S. In ASCI, August 2010.
A Taxonomy of Live Updates [pdf]Paper   bibtex
  2009 (8)
Pointless Tainting? Evaluating the Practicality of Pointer Tainting. Slowinska, A.; and Bos, H. In EuroSys, December 2009.
Pointless Tainting? Evaluating the Practicality of Pointer Tainting [pdf]Paper   bibtex
Fault Isolation for Device Drivers. Herder, J. N.; Bos, H.; Gras, B.; Homburg, P.; and Tanenbaum, A. S. In DSN, October 2009.
Fault Isolation for Device Drivers [pdf]Paper   bibtex
Application Security Code Analysis: A Step Towards Software Assurance. Rawat, S.; and Saxena, A. IJICS, 3(1): 86–110. September 2009.
Application Security Code Analysis: A Step Towards Software Assurance [link]Paper   bibtex
Danger Theory Based SYN Flood Attack Detection in Autonomic Network. Rawat, S.; and Saxena, A. In SIN, September 2009.
Danger Theory Based SYN Flood Attack Detection in Autonomic Network [link]Paper   bibtex
Cooperative Update: A New Model for Dependable Live Update. Giuffrida, C.; and Tanenbaum, A. S. In HotSwUp, September 2009.
Cooperative Update: A New Model for Dependable Live Update [pdf]Paper   bibtex
CacheCard: A Transparent Cache for Static and Dynamic Content on the NIC. Bos, H.; and Huang, K. In ANCS, September 2009.
CacheCard: A Transparent Cache for Static and Dynamic Content on the NIC [pdf]Paper   bibtex
Mapping and Synchronizing Streaming Applications on Cell Processors. Nijhuis, M.; Bos, H.; Bal, H.; and Augonnet, C. In HiPEAC, September 2009.
Mapping and Synchronizing Streaming Applications on Cell Processors [pdf]Paper   bibtex
Prepare to Die: A New Paradigm for Live Update. Giuffrida, C.; and Tanenbaum, A. Technical Report VU Amsterdam, August 2009.
Prepare to Die: A New Paradigm for Live Update [pdf]Paper   bibtex
  2008 (7)
Eudaemon: Involuntary and On-Demand Emulation Against Zero-Day Exploits. Portokalidis, G.; and Bos, H. In EuroSys, December 2008.
Eudaemon: Involuntary and On-Demand Emulation Against Zero-Day Exploits [pdf]Paper   bibtex
Beltway Buffers: Avoiding the OS Traffic Jam. Bruijn, W. d.; and Bos, H. In INFOCOM, November 2008.
Beltway Buffers: Avoiding the OS Traffic Jam [pdf]Paper   bibtex
PipesFS: Fast Linux I/O in the Unix Tradition. Bruijn, W. d.; and Bos, H. OSR. September 2008.
PipesFS: Fast Linux I/O in the Unix Tradition [pdf]Paper   bibtex
Safe Execution of Untrusted Applications on Embedded Network Processors. Bos, H.; Samwel, B.; Cristea, M.; and Anagnostakis, K. IJES, 4(3). September 2008.
Safe Execution of Untrusted Applications on Embedded Network Processors [pdf]Paper   bibtex
Model-T: Rethinking the OS for Terabit Speeds. Bruijn, W. d.; and Bos, H. In HSN, September 2008.
Model-T: Rethinking the OS for Terabit Speeds [pdf]Paper   bibtex
Future Threats to Future Trust. Bos, H.; Ioannidis, S.; Jonsson, E.; Kirda, E.; and Kruegel, C. In FTC, September 2008.
Future Threats to Future Trust [pdf]Paper   bibtex
Countering IPC Threats in Multiserver Operating Systems. Herder, J.; Bos, H.; Homburg, P.; Gras, B.; and Tanenbaum, A. S. In PRDC, September 2008.
Countering IPC Threats in Multiserver Operating Systems [pdf]Paper   bibtex
  2007 (10)
The Age of Data: Pinpointing Guilty Bytes in Polymorphic Buffer Overflows on Heap or Stack. Slowinska, A.; and Bos, H. In ACSAC, October 2007.
The Age of Data: Pinpointing Guilty Bytes in Polymorphic Buffer Overflows on Heap or Stack [pdf]Paper   bibtex
Failure Resilience for Device Drivers. Herder, J. N.; Bos, H.; Gras, B.; Homburg, P.; and Tanenbaum, A. S. In DSN, October 2007.
Failure Resilience for Device Drivers [pdf]Paper   bibtex
Network Traffic Analysis Using Singular Value Decomposition and Multiscale Transforms. Sastry, C. S.; Rawat, S.; Pujari, A. K.; and Gulati, V. P. Information Sciences, 177(23). September 2007.
Network Traffic Analysis Using Singular Value Decomposition and Multiscale Transforms [link]Paper   bibtex
Tales from the Crypt: Fingerprinting Attacks on Encrypted Channels by Way of Retainting. Valkering, M.; Slowinska, A.; and Bos, H. In EC2ND, September 2007.
Tales from the Crypt: Fingerprinting Attacks on Encrypted Channels by Way of Retainting [pdf]Paper   bibtex
The Token Based Switch: Per-Packet Access Authorisation to Optical Shortcuts. Cristea, M.; Gommans, L.; Xu, L.; and Bos, H. In Networking, September 2007.
The Token Based Switch: Per-Packet Access Authorisation to Optical Shortcuts [pdf]Paper   bibtex
A Component-Based Coordination Language for Efficient Reconfigurable Streaming Applications. Nijhuis, M.; Bos, H.; and Bal, H. In ICPP, September 2007.
A Component-Based Coordination Language for Efficient Reconfigurable Streaming Applications [pdf]Paper   bibtex
SweetBait: Zero-Hour Worm Detection and Containment Using Low- and High-Interaction Honeypots. Portokalidis, G.; and Bos, H. Computer Networks, 51(5). September 2007.
SweetBait: Zero-Hour Worm Detection and Containment Using Low- and High-Interaction Honeypots [pdf]Paper   bibtex
Ruler: Easy Packet Matching and Rewriting on Network Processors. Hruby, T.; Reeuwijk, K. v.; and Bos, H. In ANCS, September 2007.
Ruler: Easy Packet Matching and Rewriting on Network Processors [pdf]Paper   bibtex
Roadmap to a Failure-Resilient Operating System. Herder, J.; Bos, H.; Gras, B.; Homburg, P.; and Tanenbaum, A. S. ;login, 32(1). August 2007. 00010
Roadmap to a Failure-Resilient Operating System [pdf]Paper   bibtex
Use of Dimensionality Reduction for Intrusion Detection. Dash, S. K.; Rawat, S.; and Pujari, A. K. In Information Systems Security. August 2007.
Use of Dimensionality Reduction for Intrusion Detection [link]Paper   bibtex
  2006 (15)
Argos: an Emulator for Fingerprinting Zero-Day Attacks. Portokalidis, G.; Slowinska, A.; and Bos, H. In EuroSys, December 2006.
Argos: an Emulator for Fingerprinting Zero-Day Attacks [pdf]Paper   bibtex
SafeCard: A Gigabit IPS on the Network Card. Bruijn, W. d.; Slowinska, A.; Reeuwijk, K. v.; Hruby, T.; Xu, L.; and Bos, H. In RAID, October 2006.
SafeCard: A Gigabit IPS on the Network Card [pdf]Paper   bibtex
Supporting Reconfigurable Parallel Multimedia Applications. Nijhuis, M.; Bos, H.; and Bal, H. E. In EuroPar, October 2006.
Supporting Reconfigurable Parallel Multimedia Applications [pdf]Paper   bibtex
Can We Make Operating Systems Reliable and Secure?. Andrew S. Tanenbaum, J. N. H.; and Bos, H. IEEE Computer, 39(4). October 2006.
Can We Make Operating Systems Reliable and Secure? [pdf]Paper   bibtex
LLE on System Calls for Host Based Intrusion Detection. Dash, S. K.; Rawat, S.; and Pujari, A. K. In CIS, September 2006.
LLE on System Calls for Host Based Intrusion Detection [link]Paper   bibtex
On the Use of Singular Value Decomposition for a Fast Intrusion Detection System. Rawat, S.; Pujari, A. K.; and Gulati, V. P. VODCA, 142. September 2006.
On the Use of Singular Value Decomposition for a Fast Intrusion Detection System [pdf]Paper   bibtex
Masquerade Detection Using IA Network. Dash, S. K.; Rawat, S.; Kumari, G. V.; and Pujari, A. K. In CPSec, September 2006.
Masquerade Detection Using IA Network [pdf]Paper   bibtex
Intrusion Detection Using Text Processing Techniques with a Binary-Weighted Cosine Metric. Rawat, S.; Gulati, V. P.; Pujari, A. K.; and Vemuri, V. R. JIAS, 1(1). September 2006.
Intrusion Detection Using Text Processing Techniques with a Binary-Weighted Cosine Metric [pdf]Paper   bibtex
Dynamically Extending the Corral with Native Code for High-Speed Packet Processing. Bos, H.; Samwel, B.; and Booij, I. Computer Networks, 50(14). September 2006.
Dynamically Extending the Corral with Native Code for High-Speed Packet Processing [pdf]Paper   bibtex
SP@CE - An SP-based Programming Model for Consumer Electronics Streaming Applications. Varbanescu, A. L.; Nijhuis, M.; Gonzalez, A.; Escribano; Sips, H.; Bos, H.; and Ba, H. In LCPC, September 2006.
SP@CE - An SP-based Programming Model for Consumer Electronics Streaming Applications [pdf]Paper   bibtex
File Size Distribution on UNIX Systems - Then and Now. Tanenbaum, A. S.; Herder, J.; and Bos, H. OSR, 40(1). September 2006.
File Size Distribution on UNIX Systems - Then and Now [pdf]Paper   bibtex
Reorganizing UNIX for Reliability. Jorrit N. Herder, H. B.; and Tanenbaum, A. S. In ACSAC, September 2006.
Reorganizing UNIX for Reliability [pdf]Paper   bibtex
Construction of a Highly Dependable Operating System. Jorrit N. Herder, H. B.; and Tanenbaum, A. S. In EDCC, September 2006.
Construction of a Highly Dependable Operating System [pdf]Paper   bibtex
Minix 3: A Highly Reliable, Self-Repairing Operating System. Herder, J. N.; Bos, H.; Gras, B.; Homburg, P.; and Tanenbaum, A. S. OSR, 40(3). September 2006.
Minix 3: A Highly Reliable, Self-Repairing Operating System [pdf]Paper   bibtex
Modular System Programming in Minix 3. Herder, J. N.; Bos, H.; Gras, B.; Homburg, P.; and Tanenbaum, A. S. ;login, 31(2). August 2006.
Modular System Programming in Minix 3 [pdf]Paper   bibtex
  2005 (7)
Towards Software-Based Signature Detection for Intrusion Prevention on the Network Card. Bos, H.; and Huang, K. In RAID, October 2005.
Towards Software-Based Signature Detection for Intrusion Prevention on the Network Card [pdf]Paper   bibtex
FPL-3: Towards Language Support for Distributed Packet Processing. Cristea, M.; Bruijn, W. d.; and Bos, H. In Networking, September 2005.
FPL-3: Towards Language Support for Distributed Packet Processing [pdf]Paper   bibtex
Robust Distributed Systems - Achieving Self-Management Through Inference. Bruijn, W. d.; Bos, H.; and Bal, H. In ACC, September 2005.
Robust Distributed Systems - Achieving Self-Management Through Inference [pdf]Paper   bibtex
FPL-3E: Towards Language Support for Reconfigurable Packet Processing. Cristea, M. L.; Zissulescu, C.; Deprettere, E.; and Bos, H. In SAMOS, September 2005.
FPL-3E: Towards Language Support for Reconfigurable Packet Processing [link]Paper   bibtex
Application of Wavelets in Network Security. Sastry, C. S.; and Rawat, S. In Enhancing Computer Security with Smart Technology, Auerbach Publications, Boca Raton. August 2005.
Application of Wavelets in Network Security [link]Paper   bibtex
Efficient Data Mining Algorithms for Intrusion Detection. Rawat, S. Ph.D. Thesis, University of Hyderabad, August 2005.
Efficient Data Mining Algorithms for Intrusion Detection [link]Paper   bibtex
A Fast Host-Based Intrusion Detection System Using Rough Set Theory. Rawat, S.; Gulati, V. P.; and Pujari, A. K. In Transactions on Rough Sets IV. August 2005.
A Fast Host-Based Intrusion Detection System Using Rough Set Theory [link]Paper   bibtex
  2004 (6)
FFPF: Fairly Fast Packet Filters. Bos, H.; Bruijn, W. d.; Cristea, M.; Nguyen, T.; and Portokalidis, G. In OSDI, December 2004.
FFPF: Fairly Fast Packet Filters [pdf]Paper   bibtex
Frequency- and Ordering-Based Similarity Measure for Host-Based Intrusion Detection. Rawat, S.; Gulati, V. P.; and Pujari, A. K. IMCS, 12(5). September 2004.
Frequency- and Ordering-Based Similarity Measure for Host-Based Intrusion Detection [pdf]Paper   bibtex
Network Intrusion Detection Using Wavelet Analysis. Rawat, S.; and Sastry, C. S. In IIT, September 2004.
Network Intrusion Detection Using Wavelet Analysis [link]Paper   bibtex
On the Feasability of Using Network Processors for DNA Queries. Bos, H.; and Huang, K. In NP, September 2004.
On the Feasability of Using Network Processors for DNA Queries [pdf]Paper   bibtex
SNMP Plus a Lightweight API for SNAP Handling (SPLASH). Bruijn, W. d.; Bos, H.; and Moore, J. In NOMS, September 2004.
SNMP Plus a Lightweight API for SNAP Handling (SPLASH) [pdf]Paper   bibtex
Scalable Network Monitors for High-Speed Links:a Bottom-Up Approach. Nguyen, T.; Bruijn, W. d.; Cristea, M.; and Bos, H. In IPOM, September 2004.
Scalable Network Monitors for High-Speed Links:a Bottom-Up Approach [pdf]Paper   bibtex
  2003 (2)
HOKES/POKES: Lightweight Resource Sharing. Bos, H.; and Samwel, B. In EmSoft, September 2003.
HOKES/POKES: Lightweight Resource Sharing [pdf]Paper   bibtex
SCAMPI: A Scalable and Programmable Architecture for Monitoring Gigabit Networks. Coppens, J.; Berghe, S. V. d.; Bos, H.; Markatos, E.; Turck, F. D.; Oslebo, A.; and Ubik, S. In E2EMON, September 2003.
SCAMPI: A Scalable and Programmable Architecture for Monitoring Gigabit Networks [pdf]Paper   bibtex

Generated by BibBase.

vusec-logo_large