메뉴 건너뛰기




Volumn 49, Issue 1, 2006, Pages 37-39

How to think about security failures

Author keywords

[No Author keywords available]

Indexed keywords

ASSUMPTIONS; ATTACKERS; SECURITY MODELS; TECHNOLOGICAL SOLUTIONS;

EID: 33745183747     PISSN: 00010782     EISSN: 00010782     Source Type: Journal    
DOI: 10.1145/1107458.1107482     Document Type: Review
Times cited : (9)

References (4)
  • 1
    • 84858900719 scopus 로고    scopus 로고
    • Writing linux kernel keylogger
    • RD (rd@thehackerschoice.com). (June)
    • RD (rd@thehackerschoice.com). Writing Linux Kernel Keylogger. Phrack 11, 59 (June 2002); www.phrack.org/phrack/59/p59-0x0e.txt.
    • (2002) Phrack , vol.11 , pp. 59
  • 3
    • 79956039308 scopus 로고    scopus 로고
    • Strider HoneyMonkeys: Active client-side honeypots for finding Web sites that exploit browser vulnerabilities
    • Baltimore, July 31-Aug. 5
    • Wang, Y.-M. Strider HoneyMonkeys: Active client-side honeypots for finding Web sites that exploit browser vulnerabilities. Part of Works in Progress at the 14th Usenix Security Symposium (Baltimore, July 31-Aug. 5, 2005); www.usenix.org/events/sec05/wips/wang.pdf and research.microsoft.com/ HoneyMonkey/.
    • (2005) Part of Works in Progress at the 14th Usenix Security Symposium
    • Wang, Y.-M.1
  • 4
    • 33745207973 scopus 로고    scopus 로고
    • Trust transience: Post-intrusion SSH hijacking melstorm
    • Melstorm (melstorm@storm.net.nz). Presentation (Las Vegas, Aug. 4-6), opensores.thebunker.net/pub/mirrors/blackhat/presentations/bh-usa-05/ BH_US_05-Boileau/metlstorms_sshjack-1.02.tar.gz
    • Melstorm (melstorm@storm.net.nz). Trust Transience: Post-Intrusion SSH Hijacking Melstorm. Presentation at Defcon 14 (Las Vegas, Aug. 4-6, 2005); opensores.thebunker.net/pub/mirrors/blackhat/presentations/bh-usa-05/ BH_US_05-Boileau/metlstorms_sshjack-1.02.tar.gz.
    • (2005) Defcon 14


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.