메뉴 건너뛰기




Volumn 2005, Issue , 2005, Pages 263-273

An intrusion-tolerant and self-recoverable network service system using a security enhanced chip multiprocessor

Author keywords

Buffer overflow; Chip multi processor; Intrusion tolerant computing; Rootkits; Self healing; Survivable service

Indexed keywords

BUFFER OVERFLOW; CHIP MULTI PROCESSORS; INTRUSION-TOLERANT COMPUTING; ROOTKITS; SELF-HEALING; SURVIVABLE SERVICE;

EID: 33745495377     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICAC.2005.8     Document Type: Conference Paper
Times cited : (5)

References (28)
  • 3
    • 0006100649 scopus 로고    scopus 로고
    • Smashing the stack for fun and profit
    • November
    • Aleph One. Smashing The Stack For Fun And Profit. Phrack, 7(49), November 1996.
    • (1996) Phrack , vol.7 , Issue.49
    • One, A.1
  • 5
    • 84858909331 scopus 로고    scopus 로고
    • Chkrootkit. http://www.chkrootkit.org/.
  • 10
    • 78249241050 scopus 로고    scopus 로고
    • Handling interrupt descriptor table for fun and profit
    • Kad. Handling Interrupt Descriptor Table for Fun and Profit. Phrack, 11(59), 2002.
    • (2002) Phrack , vol.11 , Issue.59
    • Kad1
  • 11
    • 84858923935 scopus 로고    scopus 로고
    • Kerncheck. http://la-samhna.de/library/kern_check.c.
  • 13
    • 27544475709 scopus 로고    scopus 로고
    • Sun's niagara pours on the cores
    • September 13
    • K. Krewell. Sun's Niagara Pours on the Cores. Microprocessor Report, September 13 2004.
    • (2004) Microprocessor Report
    • Krewell, K.1
  • 15
  • 17
    • 0033295259 scopus 로고    scopus 로고
    • Bro: A system for detecting network intruders in real-time
    • 14 Dec.
    • V. Paxson. Bro: A System for Detecting Network Intruders in Real-Time. In Computer Networks, 31(23-24), pages pp. 2435-2463, 14 Dec. 1999.
    • (1999) Computer Networks , vol.31 , Issue.23-24 , pp. 2435-2463
    • Paxson, V.1
  • 19
    • 4344593013 scopus 로고    scopus 로고
    • Beyond stack smashing: Recent advances in exploiting buffer overruns
    • J. Pincus and B. Baker. Beyond Stack Smashing: Recent Advances in Exploiting Buffer Overruns. In IEEE Security and Privacy, 2(4), pages 20-27, 2004.
    • (2004) IEEE Security and Privacy , vol.2 , Issue.4 , pp. 20-27
    • Pincus, J.1    Baker, B.2
  • 20
    • 0005477419 scopus 로고    scopus 로고
    • Weakening the linux kernel
    • Plaguez. Weakening the Linux Kernel. Phrack, 8(52), 1998.
    • (1998) Phrack , vol.8 , Issue.52
    • Plaguez1
  • 21
    • 33745483890 scopus 로고    scopus 로고
    • Computer security - ESORICS 2004, 9th European symposium on research computer security, Sophia Antipolis, France, september 13-15, 2004, proceedings
    • P. Samarati, D. Gollmann, and R. Molva, editors. Springer
    • P. Samarati, D. Gollmann, and R. Molva, editors. Computer Security - ESORICS 2004, 9th European Symposium on Research Computer Security, Sophia Antipolis, France, September 13-15, 2004, Proceedings, volume 3193 of Lecture Notes in Computer Science. Springer, 2004.
    • (2004) Lecture Notes in Computer Science , vol.3193
  • 23
    • 84872311782 scopus 로고    scopus 로고
    • Linux On-the-fly kernel patching without LKM
    • Sd and Devik. Linux On-the-fly Kernel Patching without LKM. Phrack, 11(58), 2002.
    • (2002) Phrack , vol.11 , Issue.58
    • Sd1    Devik2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.