메뉴 건너뛰기




Volumn 37, Issue 5, 2003, Pages 223-236

Backtracking intrusions

Author keywords

Computer forensics; Information flow; Intrusion analysis

Indexed keywords

COMPUTER SOFTWARE; COMPUTER SYSTEMS; CRYPTOGRAPHY; GRAPH THEORY; INFORMATION ANALYSIS; SEMANTICS; WORLD WIDE WEB;

EID: 21644490164     PISSN: 01635980     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1165389.945467     Document Type: Conference Paper
Times cited : (284)

References (29)
  • 1
    • 33847278205 scopus 로고    scopus 로고
    • Steps for recovering from a UNIX or NT system compromise
    • CERT Coordination Center, April
    • Steps for Recovering from a UNIX or NT System Compromise. Technical report, CERT Coordination Center, April 2000. http://www.cert.org/tech_tips/ win-UNIX-system_compromise.htnil.
    • (2000) Technical Report
  • 2
    • 16644379211 scopus 로고    scopus 로고
    • Detecting signs of intrusion
    • CERT Coordination Center, April
    • Detecting Signs of Intrusion. Technical Report CMU/SEI-SIM-009, CERT Coordination Center, April 2001. http://www.cert.org/security-improvement/modules/m09.html.
    • (2001) Technical Report , vol.CMU-SEI-SIM-009
  • 3
    • 84860972811 scopus 로고    scopus 로고
    • Sendmail debugger arbitrary code execution vulnerability
    • L-133, Computer Incident Advisory Capability, August
    • L-133: Sendmail Debugger Arbitrary Code Execution Vulnerability. Technical report, Computer Incident Advisory Capability, August 2001. http://www.ciac.org/ciac/bulletins/l-133.shtml.
    • (2001) Technical Report
  • 4
    • 0041482634 scopus 로고    scopus 로고
    • CERT/CC overview incident and vulnerability trends
    • CERT Coordination Center, April
    • CERT/CC Overview Incident and Vulnerability Trends. Technical report, CERT Coordination Center, April 2002. http://www.cert.org/present/cert-overview-trends/.
    • (2002) Technical Report
  • 5
    • 16644397156 scopus 로고    scopus 로고
    • Multiple vulnerabilities in OpenSSL
    • CERT Advisory CA-2002-23, CERT Coordination Center, July
    • Multiple Vulnerabilities In OpenSSL. Technical Report CERT Advisory CA-2002-23, CERT Coordination Center, July 2002. http://www.cert.org/advisories/CA-2002-23.html.
    • (2002) Technical Report
  • 9
    • 0009016272 scopus 로고
    • An evening with Berferd in which a cracker is lured, endured, and studied
    • January
    • Bill Cheswick. An Evening with Berferd in Which a Cracker is Lured, Endured, and Studied. In Proceedings of the Winter 1992 USENIX Technical Conference, pages 163-174, January 1992.
    • (1992) Proceedings of the Winter 1992 USENIX Technical Conference , pp. 163-174
    • Cheswick, B.1
  • 10
    • 16644367219 scopus 로고    scopus 로고
    • The Incident Detection, Analysis, and Response (IDAR) project
    • CERT Coordination Center, July
    • Alan M. Christie. The Incident Detection, Analysis, and Response (IDAR) Project. Technical report, CERT Coordination Center, July 2002. http://www.cert.org/idar.
    • (2002) Technical Report
    • Christie, A.M.1
  • 11
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • May
    • Dorothy E. Denning. A lattice model of secure information flow. Communications of the ACM, 19(5):236-243, May 1976.
    • (1976) Communications of the ACM , vol.19 , Issue.5 , pp. 236-243
    • Denning, D.E.1
  • 14
  • 15
    • 16644376937 scopus 로고    scopus 로고
    • Forensic computer analysis: An introduction
    • September
    • Dan Farmer and Wietse Venema. Forensic computer analysis: an introduction. Dr. Dobb's Journal, September 2000.
    • (2000) Dr. Dobb's Journal
    • Farmer, D.1    Venema, W.2
  • 23
    • 0017996760 scopus 로고
    • Time, clocks, and the ordering of events in a distributed system
    • July
    • Leslie Lamport. Time, Clocks, and the Ordering of Events in a Distributed System. Communications of the ACM, 21(7):558-565, July 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.7 , pp. 558-565
    • Lamport, L.1
  • 24
    • 0015672289 scopus 로고
    • A note on the confinement problem
    • October
    • Butler W. Lampson. A Note on the Confinement Problem. Communications of the ACM, 16(10):613-615, October 1973.
    • (1973) Communications of the ACM , vol.16 , Issue.10 , pp. 613-615
    • Lampson, B.W.1
  • 26
    • 0000990322 scopus 로고
    • A survey of program slicing techniques
    • Frank Tip
    • Frank Tip. A survey of program slicing techniques. Journal of Programming Languages, 3(3), 1995.
    • (1995) Journal of Programming Languages , vol.3 , Issue.3
    • Tip, F.1
  • 27
    • 33646828569 scopus 로고    scopus 로고
    • DERBI: Diagnosis, explanation and recovery from computer break-ins
    • DARPA Project F30602-96-C-0295 Final Report, SRI International, Artificial Intelligence Center, January
    • W. M. Tyson. DERBI: Diagnosis, Explanation and Recovery from Computer Break-ins. Technical Report DARPA Project F30602-96-C-0295 Final Report, SRI International, Artificial Intelligence Center, January 2001. http://www.dougmoran.com/dmoran/publications.html.
    • (2001) Technical Report
    • Tyson, W.M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.