메뉴 건너뛰기




Volumn , Issue , 2005, Pages 247-253

Software diversity as a defense against viral propagation: Models and simulations

Author keywords

[No Author keywords available]

Indexed keywords

EPIDEMIC THRESHOLD; SOFTWARE DIVERSITY; SOFTWARE MONOCULTURE;

EID: 26844504054     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/PADS.2005.31     Document Type: Conference Paper
Times cited : (13)

References (24)
  • 2
    • 84862209017 scopus 로고    scopus 로고
    • Address obfuscation: An efficient approach to combat a broad range of memory error exploits
    • Washington D.C., USA, August
    • S. Bhatkar, D. C. DuVarney, and R. Sekar. Address obfuscation: An efficient approach to combat a broad range of memory error exploits. In Proc. of the 12th USENIX Security Symposium, pages 105-120, Washington D.C., USA, August 2003.
    • (2003) Proc. of the 12th USENIX Security Symposium , pp. 105-120
    • Bhatkar, S.1    DuVarney, D.C.2    Sekar, R.3
  • 7
    • 3042778519 scopus 로고    scopus 로고
    • Monopoly considered harmful
    • December
    • D. Geer. Monopoly considered harmful. IEEE Security & Privacy Magazine, 1(6):14-16, December 2003.
    • (2003) IEEE Security & Privacy Magazine , vol.1 , Issue.6 , pp. 14-16
    • Geer, D.1
  • 9
    • 26844555602 scopus 로고    scopus 로고
    • Addressing the monoculture
    • December
    • G. Goth. Addressing the monoculture. IEEE Security & Privacy Magazine, 1(6):8-10, December 2003.
    • (2003) IEEE Security & Privacy Magazine , vol.1 , Issue.6 , pp. 8-10
    • Goth, G.1
  • 10
    • 14944350832 scopus 로고    scopus 로고
    • Review and analysis of synthetic diversity for breaking monocultures
    • Washington, D.C., October
    • J. E. Just and M. Cornwell. Review and analysis of synthetic diversity for breaking monocultures. In Proc. of the 2nd Workshop on Rapid Malcode, Washington, D.C., October 2004.
    • (2004) Proc. of the 2nd Workshop on Rapid Malcode
    • Just, J.E.1    Cornwell, M.2
  • 14
    • 0042474173 scopus 로고    scopus 로고
    • Internet quarantine: Requirements for containing self-propagating code
    • March-April
    • D. Moore, C. Shannon, G.M. Voelker, and S. Savage. Internet quarantine: Requirements for containing self-propagating code. In IEEE INFOCOM, pages 1901-1910, March-April 2003.
    • (2003) IEEE INFOCOM , pp. 1901-1910
    • Moore, D.1    Shannon, C.2    Voelker, G.M.3    Savage, S.4
  • 15
    • 14844337104 scopus 로고    scopus 로고
    • On achieving software diversity for improved network security using distributed coloring algorithms
    • Washington, B.C., October
    • A. J. O'Donnell and H. Sethu. On achieving software diversity for improved network security using distributed coloring algorithms. In Proc. of the 11th ACM Conference on Computer and Communications Security, pages 121-131, Washington, B.C., October 2004.
    • (2004) Proc. of the 11th ACM Conference on Computer and Communications Security , pp. 121-131
    • O'Donnell, A.J.1    Sethu, H.2
  • 16
    • 0035363452 scopus 로고    scopus 로고
    • Epidemic dynamics and endemic states in complex networks
    • 066117
    • R. Pastor-Satorras and A. Vespignani. Epidemic dynamics and endemic states in complex networks. Phys. Rev. E, 63(066117), 2001.
    • (2001) Phys. Rev. E , vol.63
    • Pastor-Satorras, R.1    Vespignani, A.2
  • 18
    • 26844505311 scopus 로고    scopus 로고
    • Internet worms
    • NISSC
    • A. Powell. Internet worms. Tech Report 00727, NISSC, 2003. http://www.niscc.gov.uk/niscc/docs/re-20030805-00727.pdf.
    • (2003) Tech Report 00727
    • Powell, A.1
  • 19
    • 4243066282 scopus 로고    scopus 로고
    • Risks of monoculture
    • M. Stamp. Risks of monoculture. Commun. ACM, 47(3): 120, 2004.
    • (2004) Commun. ACM , vol.47 , Issue.3 , pp. 120
    • Stamp, M.1
  • 22
    • 4544275741 scopus 로고    scopus 로고
    • Modeling the effects of timing parameters on virus propagation
    • ACM Press
    • Y. Wang and C. Wang. Modeling the effects of timing parameters on virus propagation. In Proc. of the 2003 ACM Workshop on Rapid Malcode, pages 61-66. ACM Press, 2003.
    • (2003) Proc. of the 2003 ACM Workshop on Rapid Malcode , pp. 61-66
    • Wang, Y.1    Wang, C.2
  • 23


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.