메뉴 건너뛰기




Volumn 17, Issue 5, 2000, Pages 33-41

Attacking malicious code: A report to the Infosec Research Council

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER OPERATING SYSTEMS; COMPUTER VIRUSES; COMPUTER WORMS; DATA COMMUNICATION SYSTEMS; INTERNET; JAVA PROGRAMMING LANGUAGE;

EID: 0034269416     PISSN: 07407459     EISSN: None     Source Type: Journal    
DOI: 10.1109/52.877857     Document Type: Article
Times cited : (185)

References (14)
  • 1
    • 84949505015 scopus 로고    scopus 로고
    • ITS4: A static vulnerability scanner for c and c++ code
    • 2000, IEEE Computer Soc. Press, Los Alamitos, Calif: the ITS4 tool
    • J. Viega et al., "ITS4: A Static Vulnerability Scanner for C and C++ Code," To appear in Proc. Ann. Computer Security Applications Conf. 2000, IEEE Computer Soc. Press, Los Alamitos, Calif: the ITS4 tool is available at www.rstcorp.com/its4.
    • Proc. Ann. Computer Security Applications Conf.
    • Viega, J.1
  • 2
    • 0002946830 scopus 로고    scopus 로고
    • A first step towards automated detection of buffer overrun vulnerabilities
    • Internet Soc., Reston, Va
    • D. Wagner et al., "A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities," Proc. Network and Distributed Systems Security Symposium (NDSS 2000), Internet Soc., Reston, Va., 2000, pp. 3-18.
    • (2000) Proc. Network and Distributed Systems Security Symposium (Ndss 2000) , pp. 3-18
    • Wagner, D.1
  • 4
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • IEEE Press, Piscataway, N.J
    • J.H. Salzter and M.D. Schroeder, "The Protection of Information in Computer Systems," Proc. IEEE, IEEE Press, Piscataway, N.J., Vol. 9, No. 63, 1975, pp. 1278-1308.
    • (1975) Proc. Ieee , vol.9 , Issue.63 , pp. 1278-1308
    • Salzter, J.H.1    Schroeder, M.D.2
  • 8
    • 84940110094 scopus 로고    scopus 로고
    • Policy-directed code safety
    • IEEE Press, Piscataway, N.J
    • D. Evans and A. Twyman, "Policy-Directed Code Safety," Proc. IEEE Symp. Security an Privacy, IEEE Press, Piscataway, N.J., 1999; see also www.cs.virginia. edu/∼evans.
    • (1999) Proc. IEEE Symp. Security An Privacy
    • Evans, D.1    Twyman, A.2
  • 9
    • 0033489650 scopus 로고    scopus 로고
    • SASI enforcement of security policies: A retrospective
    • U. ACM Press, New York
    • U. Erlingsson, U. and F.B. Schneider, ∼SASI Enforcement of Security Policies: A Retrospective,∼ Proc. New Security Paradigms Workshop, ACM Press, New York, 1999, pp. 246-255.
    • (1999) Proc. New Security Paradigms Workshop , pp. 246-255
    • Erlingsson, U.1    Schneider, F.B.2
  • 12
    • 0041525084 scopus 로고    scopus 로고
    • From system-F to typed assembly language
    • May
    • G. Morrisett et al., "From System-F to Typed Assembly Language," ACM Trans. Programming Languages and Systems, Vol., 21, No. 3, May 1999, pp. 528-569; www.cs.cornell.edu/talc.
    • (1999) ACM Trans. Programming Languages and Systems , vol.21 , Issue.3 , pp. 528-569
    • Morrisett, G.1
  • 14
    • 84939573910 scopus 로고    scopus 로고
    • Differential power analysis: Leaking secrets
    • M. Weiner, ed., Lecture Notes in Computer Science, Springer, New York, Aug
    • P. Kocher, J. Jaffee, and B. Jun, "Differential Power Analysis: Leaking Secrets," Advances in Cryptology-CRYPTO'99. . In M. Weiner, ed., Lecture Notes in Computer Science, Vol. 1666, Springer, New York, Aug. 1999, pp. 388-397; www.cryptography.com/dpa/Dpa.pdf.
    • (1999) Advances in Cryptology-cRYPTO'99 , vol.1666 , pp. 388-397
    • Kocher, P.1    Jaffee, J.2    Jun, B.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.