메뉴 건너뛰기




Volumn 17, Issue 5, 2000, Pages 59-67

Remediation of application-specific security vulnerabilities at runtime

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER CRIME; WORLD WIDE WEB;

EID: 0034269817     PISSN: 07407459     EISSN: None     Source Type: Journal    
DOI: 10.1109/52.877867     Document Type: Article
Times cited : (7)

References (16)
  • 1
    • 0342772508 scopus 로고    scopus 로고
    • Conflict and the computer: Information warfare and related ethical issues
    • Nat'l Computer Security Center, Fort Meade, Md.
    • S. Kitzberg, "Conflict and the Computer: Information Warfare and Related Ethical Issues," Proc. 21st Nat'1 Information System Security Conf., Nat'l Computer Security Center, Fort Meade, Md., pp. 126-135.
    • Proc. 21st Nat'1 Information System Security Conf. , pp. 126-135
    • Kitzberg, S.1
  • 3
    • 0006100649 scopus 로고    scopus 로고
    • Smashing the stack for fun and profit
    • 9 Nov. 1996; current Sept.
    • Aleph One, "Smashing the Stack for Fun and Profit," Phrack Online, Vol. 7, No. 49, 9 Nov. 1996; www. phrack.com (current Sept. 2000).
    • (2000) Phrack Online , vol.7 , Issue.49
    • Aleph, O.1
  • 4
    • 0041065277 scopus 로고
    • The internet worm program: Analysis
    • Jan.
    • E. Spafford, "The Internet Worm Program: Analysis," Computer Comm. Review, Vol. 19, No. 1, Jan. 1989.
    • (1989) Computer Comm. Review , vol.19 , Issue.1
    • Spafford, E.1
  • 5
    • 0343207196 scopus 로고    scopus 로고
    • Carnegie Mellon Software Eng. Inst.; current Sept.
    • CERT/CC Advisories 1988-2000, Carnegie Mellon Software Eng. Inst.; www.cert.org/advisories (current Sept. 2000).
    • (2000) CERT/CC Advisories 1988-2000
  • 6
    • 0030092390 scopus 로고    scopus 로고
    • Checking for race conditions in file accesses
    • Spring
    • M. Bishop and M. Dilger, "Checking for Race Conditions in File Accesses," Computing Systems, Vol. 9, No. 2, Spring 1996, pp. 131-152.
    • (1996) Computing Systems , vol.9 , Issue.2 , pp. 131-152
    • Bishop, M.1    Dilger, M.2
  • 7
    • 85059291063 scopus 로고
    • Tech. Report NBS 919, Inst. for Computer Sciences and Technology, Nat'l Bureau of Standards, US Dept. of Commerce, Washington, D.C.
    • T.A. Linden, Operating System Structures to Support Security and Reliable Software, Tech. Report NBS 919, Inst. for Computer Sciences and Technology, Nat'l Bureau of Standards, US Dept. of Commerce, Washington, D.C., 1976.
    • (1976) Operating System Structures to Support Security and Reliable Software
    • Linden, T.A.1
  • 8
    • 85084160243 scopus 로고    scopus 로고
    • StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks
    • USENIX, Berkeley, Calif.
    • C. Cowan et al., "StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks," Proc. Seventh USENIX Security Symp., USENIX, Berkeley, Calif., 1998, pp. 63-78.
    • (1998) Proc. Seventh USENIX Security Symp. , pp. 63-78
    • Cowan, C.1
  • 10
    • 0012624241 scopus 로고
    • Experiences with tripwire: Using integrity checkers for intrusion detection
    • USENIX, Berkeley, Calif.
    • G.H. Kim and E.H. Spafford, "Experiences with Tripwire: Using Integrity Checkers for Intrusion Detection," Proc. Systems Administration, Networking, and Security Conf. III, USENIX, Berkeley, Calif., 1994, pp. 89-101.
    • (1994) Proc. Systems Administration, Networking, and Security Conf. III , vol.3 , pp. 89-101
    • Kim, G.H.1    Spafford, E.H.2
  • 11
    • 0028994280 scopus 로고
    • Fault-tolerance for off-the-shelf applications and hardware
    • IEEE Computer Society Press, Los Alamitos, Calif.
    • M. Russinovich and Z. Segall, "Fault-Tolerance for Off-the-Shelf Applications and Hardware," Proc. 25th Int'l Symp. Fault-Tolerant Computing, IEEE Computer Society Press, Los Alamitos, Calif., 1995, pp. 67-71.
    • (1995) Proc. 25th Int'l Symp. Fault-Tolerant Computing , pp. 67-71
    • Russinovich, M.1    Segall, Z.2
  • 12
    • 0031332426 scopus 로고    scopus 로고
    • Using kernel hypervisors to secure applications
    • IEEE Computer Soc. Press, Los Alamitos, Calif.
    • T. Mitchem, R. Lu, and R. O'Brien, "Using Kernel Hypervisors to Secure Applications," Proc. Ann. Computer Security Application Conf., IEEE Computer Soc. Press, Los Alamitos, Calif., 1997, pp. 175-181.
    • (1997) Proc. Ann. Computer Security Application Conf. , pp. 175-181
    • Mitchem, T.1    Lu, R.2    O'Brien, R.3
  • 13
    • 0342772502 scopus 로고    scopus 로고
    • Computer Associates white paper, Jan. 2000; current Sept.
    • eTrust Access Control for UNIX, Computer Associates white paper, Jan. 2000; www.ca.com/solutions/ enterprise/etrust/whitepapers.htm (current Sept. 2000).
    • (2000) eTrust Access Control for UNIX
  • 14
    • 84940106242 scopus 로고    scopus 로고
    • Hardening COTS software with generic software wrappers
    • IEEE Computer Soc. Press, Los Alamitos, Calif.
    • T. Fraser, L. Badger, and M. Feldman, "Hardening COTS Software with Generic Software Wrappers," Proc. 1999 Symp. Security and Privacy, IEEE Computer Soc. Press, Los Alamitos, Calif., 1999, pp. 2-16.
    • (1999) Proc. 1999 Symp. Security and Privacy , pp. 2-16
    • Fraser, T.1    Badger, L.2    Feldman, M.3
  • 15
    • 0031258214 scopus 로고    scopus 로고
    • Computer immunology
    • Oct.
    • S. Forrest, S. Hofmeyr, and A. Somayaji, "Computer Immunology," Comm. ACM, Vol. 40, No. 10, Oct. 1997, pp. 88-96.
    • (1997) Comm. ACM , vol.40 , Issue.10 , pp. 88-96
    • Forrest, S.1    Hofmeyr, S.2    Somayaji, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.