메뉴 건너뛰기




Volumn 2006, Issue , 2006, Pages 125-137

Design space and analysis of worm defense strategies

Author keywords

Antibody; Blacklisting; Defense strategy analysis; Local containment; Proactive protection; Worm propagation; Worm taxonomy; Worms

Indexed keywords

BLACKLISTING; DEFENSE STRATEGY ANALYSIS; LOCAL CONTAINMENT; PROACTIVE PROTECTION; WORM PROPAGATION; WORM TAXONOMY;

EID: 33751035317     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1128817.1128837     Document Type: Conference Paper
Times cited : (21)

References (32)
  • 1
    • 34247333250 scopus 로고    scopus 로고
    • PaX. http://pax.grsecurity.net/.
    • PaX. http
  • 7
    • 14944374640 scopus 로고    scopus 로고
    • Mitigating buffer overflows by operating system randomization
    • Technical report, Carnegie Mellon University
    • M. Chew and D. Song. Mitigating buffer overflows by operating system randomization. Technical report, Carnegie Mellon University, 2002.
    • (2002)
    • Chew, M.1    Song, D.2
  • 11
    • 0034486891 scopus 로고    scopus 로고
    • The Mathematics of Infectious Diseases
    • H. W. Hethcote. The Mathematics of Infectious Diseases. SIAM Review, 42(4):599-653, 2000.
    • (2000) SIAM Review , vol.42 , Issue.4 , pp. 599-653
    • Hethcote, H.W.1
  • 20
    • 56349146235 scopus 로고    scopus 로고
    • Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
    • Technical Report CMU-CS-04-140, Carnegie Mellon University
    • J. Newsome and D. Song. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. Technical Report CMU-CS-04-140, Carnegie Mellon University, 2004.
    • (2004)
    • Newsome, J.1    Song, D.2
  • 26
    • 84906818067 scopus 로고    scopus 로고
    • Where's the feeb? the effectiveness of instruction set randomization
    • August
    • N. Sovarel, D. Evans, and N. Paul. Where's the feeb? the effectiveness of instruction set randomization. In 14th USENIX Security Symposium, August 2005.
    • (2005) 14th USENIX Security Symposium
    • Sovarel, N.1    Evans, D.2    Paul, N.3
  • 30
    • 27644552867 scopus 로고    scopus 로고
    • Transparent runtime randomization for security
    • Technical report, Center for Reliable and Higher Performance Computing, University of Illinois at Urbana-Champaign, May
    • J. Xu, Z. Kalbarczyk, and R. K. Iyer. Transparent runtime randomization for security. Technical report, Center for Reliable and Higher Performance Computing, University of Illinois at Urbana-Champaign, May 2003.
    • (2003)
    • Xu, J.1    Kalbarczyk, Z.2    Iyer, R.K.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.