Dartmouth College Computer Science
Technical Report series
TR search TR listserv
|By author:||A B C D E F G H I J K L M N O P Q R S T U V W X Y Z|
|By number:||2018, 2017, 2016, 2015, 2014, 2013, 2012, 2011, 2010, 2009, 2008, 2007, 2006, 2005, 2004, 2003, 2002, 2001, 2000, 1999, 1998, 1997, 1996, 1995, 1994, 1993, 1992, 1991, 1990, 1989, 1988, 1987, 1986|
TR2004-493: The Kerf toolkit for intrusion analysis
TR2006-584: Tools and algorithms to advance interactive intrusion analysis via Machine Learning and Information Retrieval
TR2007-591: Dumbots: Unexpected Botnets through Networked Embedded Devices
TR2008-610: Active Behavioral Fingerprinting of Wireless Devices
TR2008-634: LZfuzz: a fast compression-based fuzzer for poorly documented protocols
TR2009-653: Distributed Monitoring of Conditional Entropy for Network Anomaly Detection
TR2009-657: Katana: A Hot Patching Framework for ELF Executables
TR2010-661: On the Reliability of Wireless Fingerprinting using Clock Skews
TR2011-680: Exploiting the Hard-Working DWARF: Trojans with no Native Executable Code
TR2011-701: Beyond SELinux: the Case for Behavior-Based Policy and Trust Languages
TR2011-709: Security Applications of Formal Language Theory
TR2013-727: ELFbac: Using the Loader Format for Intent-Level Semantics and Fine-Grained Protection
TR2014-746: Fingerprinting IEEE 802.15.4 Devices with Commodity Radios
TR2014-749: Speaking the Local Dialect: Exploiting differences between IEEE 802.15.4 Receivers with Commodity Radios for fingerprinting, targeted attacks, and WIDS evasion
Notify me about new tech reports.
Search the technical reports.
To receive paper copy of a report, by mail, send your address and the TR number to reports AT cs.dartmouth.edu
Copyright notice: The documents contained in this server are included by the contributing authors as a means to ensure timely dissemination of scholarly and technical work on a non-commercial basis. Copyright and all rights therein are maintained by the authors or by other copyright holders, notwithstanding that they have offered their works here electronically. It is understood that all persons copying this information will adhere to the terms and constraints invoked by each author's copyright. These works may not be reposted without the explicit permission of the copyright holder.
Technical reports collection maintained by David Kotz.