메뉴 건너뛰기




Volumn , Issue , 2005, Pages 213-222

Fast and automated generation of attack signatures: A basis for building self-protecting servers

Author keywords

Buffer overflow; Denial of service protection; Memory error; Signature generation; Worm defense

Indexed keywords

COMPUTER SOFTWARE; COMPUTER WORMS; SECURITY SYSTEMS; SERVERS; STATE SPACE METHODS;

EID: 33745800070     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (117)

References (42)
  • 1
    • 33745769112 scopus 로고    scopus 로고
    • The PaX team, http://pax.grsecurity.net.
  • 3
    • 18744376889 scopus 로고    scopus 로고
    • Randomized instruction set emulation to disrupt binary code injection attacks
    • E. Barrantes et al. Randomized instruction set emulation to disrupt binary code injection attacks. In ACM CCS, 2003.
    • (2003) ACM CCS
    • Barrantes, E.1
  • 4
    • 84862209017 scopus 로고    scopus 로고
    • Address obfuscation: An efficient approach to combat a broad range of memory error exploits
    • S. Bhatkar, D. DuVarney, and R. Sekar. Address obfuscation: An efficient approach to combat a broad range of memory error exploits. In USENIX Security, 2003.
    • (2003) USENIX Security
    • Bhatkar, S.1    DuVarney, D.2    Sekar, R.3
  • 5
    • 84954188728 scopus 로고    scopus 로고
    • Efficient techniques for comprehensive protection from memory error exploits
    • S. Bhatkar, R. Sekar, and D. DuVarney. Efficient techniques for comprehensive protection from memory error exploits. In USENIX Security, 2005.
    • (2005) USENIX Security
    • Bhatkar, S.1    Sekar, R.2    DuVarney, D.3
  • 7
    • 0035017559 scopus 로고    scopus 로고
    • RAD: A compile-time solution to buffer overflow attacks
    • T. Chiueh and F. Hsu. RAD: A compile-time solution to buffer overflow attacks. In ICDCS, 2001.
    • (2001) ICDCS
    • Chiueh, T.1    Hsu, F.2
  • 9
    • 84885679117 scopus 로고    scopus 로고
    • Vigilante: End-to-end containment of Internet worms
    • M. Costa et al. Vigilante: End-to-end containment of Internet worms. In SOSP, 2005.
    • (2005) SOSP
    • Costa, M.1
  • 10
    • 85084160243 scopus 로고    scopus 로고
    • StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks
    • C. Cowan et al. StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks. In USENIX Security, 1998.
    • (1998) USENIX Security
    • Cowan, C.1
  • 12
    • 33745777666 scopus 로고    scopus 로고
    • CTCP: A centralized TCP/IP architecture for networking security
    • F. Hsu and T. Chiueh. CTCP: A centralized TCP/IP architecture for networking security. In ACSAC, 2004.
    • (2004) ACSAC
    • Hsu, F.1    Chiueh, T.2
  • 14
    • 12544250338 scopus 로고    scopus 로고
    • Backwards-compatible bounds checking for arrays and pointers in C programs
    • R. Jones and P. Kelly. Backwards-compatible bounds checking for arrays and pointers in C programs. In Intl. Workshop on Automated Debugging, 1997.
    • (1997) Intl. Workshop on Automated Debugging
    • Jones, R.1    Kelly, P.2
  • 15
    • 14844317200 scopus 로고    scopus 로고
    • Countering code-injection attacks with instruction-set randomization
    • G. Kc, A. Keromytis, and V. Prevelakis. Countering code-injection attacks with instruction-set randomization. In ACM CCS, 2003.
    • (2003) ACM CCS
    • Kc, G.1    Keromytis, A.2    Prevelakis, V.3
  • 16
    • 85084163246 scopus 로고    scopus 로고
    • Autograph: Toward automated, distributed worm signature detection
    • H. Kim and B. Karp. Autograph: Toward automated, distributed worm signature detection. In USENIX Security, 2004.
    • (2004) USENIX Security
    • Kim, H.1    Karp, B.2
  • 17
    • 33646048960 scopus 로고    scopus 로고
    • Honeycomb - Creating intrusion detection signatures using honeypots
    • C. Kreibich and J. Crowcroft. Honeycomb - creating intrusion detection signatures using honeypots. In HotNets-II, 2003.
    • (2003) HotNets-II
    • Kreibich, C.1    Crowcroft, J.2
  • 18
    • 33846294027 scopus 로고    scopus 로고
    • Automatic generation of buffer overflow attack signatures: An approach based on program behavior models
    • Z. Liang and R. Sekar. Automatic generation of buffer overflow attack signatures: An approach based on program behavior models. In ACSAC, 2005.
    • (2005) ACSAC
    • Liang, Z.1    Sekar, R.2
  • 20
    • 0036040304 scopus 로고    scopus 로고
    • CCured: Type-safe retrofitting of legacy code
    • G. Necula, S. McPeak, and W. Weimer. CCured: Type-safe retrofitting of legacy code. In POPL, 2002.
    • (2002) POPL
    • Necula, G.1    McPeak, S.2    Weimer, W.3
  • 21
    • 33745772237 scopus 로고    scopus 로고
    • Polygraph: Automatically generating signatures for polymorphic worms
    • J. Newsome, B. Karp, and D. Song. Polygraph: Automatically generating signatures for polymorphic worms. In IEEE S&P, 2005.
    • (2005) IEEE S&P
    • Newsome, J.1    Karp, B.2    Song, D.3
  • 22
    • 79953672829 scopus 로고    scopus 로고
    • Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
    • J. Newsome and D. Song. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In NDSS, 2005.
    • (2005) NDSS
    • Newsome, J.1    Song, D.2
  • 23
    • 26444472580 scopus 로고    scopus 로고
    • Buttercup: On network-based detection of polymorphic buffer overflow vulnerabilities
    • A. Pasupulati et al. Buttercup: On network-based detection of polymorphic buffer overflow vulnerabilities. In IEEE/IFIP Network Operation and Management Symposium, 2004.
    • (2004) IEEE/IFIP Network Operation and Management Symposium
    • Pasupulati, A.1
  • 26
    • 21644473822 scopus 로고    scopus 로고
    • A dynamic technique for eliminating buffer overflow vulnerabilities (and other memory errors)
    • M. Rinard, C. Cadar, D. Roy, and D. Dumitran. A dynamic technique for eliminating buffer overflow vulnerabilities (and other memory errors). In ACSAC, 2004.
    • (2004) ACSAC
    • Rinard, M.1    Cadar, C.2    Roy, D.3    Dumitran, D.4
  • 27
    • 77954504457 scopus 로고    scopus 로고
    • A practical dynamic buffer overflow detector
    • O. Ruwase and M. Lam. A practical dynamic buffer overflow detector. In NDSS, 2004.
    • (2004) NDSS
    • Ruwase, O.1    Lam, M.2
  • 28
    • 20444442399 scopus 로고    scopus 로고
    • A fast automaton-based method for detecting anomalous program behaviors
    • R. Sekar, M. Bendre, P. Bollineni, and D. Dhurjati. A fast automaton-based method for detecting anomalous program behaviors. In IEEE S&P, 2001.
    • (2001) IEEE S&P
    • Sekar, R.1    Bendre, M.2    Bollineni, P.3    Dhurjati, D.4
  • 30
    • 30344459996 scopus 로고    scopus 로고
    • Countering network worms through automatic patch generation
    • S. Sidiroglou and A. Keromytis. Countering network worms through automatic patch generation. IEEE Security & Privacy, 2005.
    • (2005) IEEE Security & Privacy
    • Sidiroglou, S.1    Keromytis, A.2
  • 33
    • 84882623448 scopus 로고    scopus 로고
    • DIRA: Automatic detection, identification and repair of control-hijacking attacks
    • A. Smimov and T. Chiueh. DIRA: Automatic detection, identification and repair of control-hijacking attacks. In NDSS, 2005.
    • (2005) NDSS
    • Smimov, A.1    Chiueh, T.2
  • 35
    • 84906818067 scopus 로고    scopus 로고
    • Where's the FEEB?: The effectiveness of instruction set randomization
    • A. Sovarel, D. Evans, and N. Paul. Where's the FEEB?: The effectiveness of instruction set randomization. In USENIX Security, 2005.
    • (2005) USENIX Security
    • Sovarel, A.1    Evans, D.2    Paul, N.3
  • 36
    • 25844462447 scopus 로고    scopus 로고
    • Defending against Internet worms: A signature-based approach
    • Y. Tang and S. Chen. Defending against Internet worms: A signature-based approach. In INFOCOM, 2005.
    • (2005) INFOCOM
    • Tang, Y.1    Chen, S.2
  • 37
    • 1642268792 scopus 로고    scopus 로고
    • Accurate buffer overflow detection via abstract payload execution
    • T. Toth and C. Kruegel. Accurate buffer overflow detection via abstract payload execution. In RAID, 2002.
    • (2002) RAID
    • Toth, T.1    Kruegel, C.2
  • 38
    • 27544510809 scopus 로고    scopus 로고
    • Shield: Vulnerability-driven network filters for preventing known vulnerability exploits
    • H. Wang, C. Guo, D. Simon, and A. Zugenmaier. Shield: Vulnerability-driven network filters for preventing known vulnerability exploits. In SIGCOMM, 2004.
    • (2004) SIGCOMM
    • Wang, H.1    Guo, C.2    Simon, D.3    Zugenmaier, A.4
  • 39
    • 30344438592 scopus 로고    scopus 로고
    • Anomalous payload-based network intrusion detection
    • K. Wang and S. Stolfo. Anomalous payload-based network intrusion detection. In RAID, 2004.
    • (2004) RAID
    • Wang, K.1    Stolfo, S.2
  • 40
    • 33745803872 scopus 로고    scopus 로고
    • Automatic diagnosis and response to memory corruption vulnerabilities
    • J. Xu, P. Ning, C. Kil, Y. Zhai, and C. Bookholt. Automatic diagnosis and response to memory corruption vulnerabilities. In ACM CCS, 2005.
    • (2005) ACM CCS
    • Xu, J.1    Ning, P.2    Kil, C.3    Zhai, Y.4    Bookholt, C.5
  • 41
    • 20344383014 scopus 로고    scopus 로고
    • An efficient and backwards-compatible transformation to ensure memory safety of C programs
    • W. Xu, D. DuVarney, and R. Sekar, An efficient and backwards-compatible transformation to ensure memory safety of C programs, In FSE, 2004.
    • (2004) FSE
    • Xu, W.1    DuVarney, D.2    Sekar, R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.