메뉴 건너뛰기




Volumn 2005, Issue , 2005, Pages 225-232

Evolving successful stack overflow attacks for vulnerability testing

Author keywords

[No Author keywords available]

Indexed keywords

MALICIOUS BUFFERS; MISUSE DETECTION; STACK OVERFLOW;

EID: 33751054751     PISSN: 10639527     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSAC.2005.23     Document Type: Conference Paper
Times cited : (16)

References (19)
  • 4
    • 35048839283 scopus 로고    scopus 로고
    • Vulnerability analysis of immunity-based intrusion detection systems using evolutionary hackers
    • Proceedings of the Genetic and Evolutionary Computation Conference
    • Dozier, G., Brown, D., Cain, K., Hurley, J., "Vulnerability analysis of immunity-based intrusion detection systems using evolutionary hackers," Proceedings of the Genetic and Evolutionary Computation Conference, Lecture Notes in Computer Science, LNCS 3102, pp 263-274, 2004.
    • (2004) Lecture Notes in Computer Science, LNCS , vol.3102 , pp. 263-274
    • Dozier, G.1    Brown, D.2    Cain, K.3    Hurley, J.4
  • 8
    • 0002819121 scopus 로고
    • A Comparative Analysis of Selection Schemes Used in Genetic Algorithms
    • G.J.E. Rawlins ed, Morgan Kaufmann, ISBN 1-55860-170-8
    • Goldberg D.E., Deb K., "A Comparative Analysis of Selection Schemes Used in Genetic Algorithms," in Foundations of Genetic Algorithms, G.J.E. Rawlins (ed.), Morgan Kaufmann, ISBN 1-55860-170-8, 1991.
    • (1991) Foundations of Genetic Algorithms
    • Goldberg, D.E.1    Deb, K.2
  • 11
    • 33846276395 scopus 로고    scopus 로고
    • Miller B.L., Shaw M.J., Genetic Algorithms with dynamic Niche Sharing for Multimodal Function optimization, University Of Illinois at Urbana-Champaign, Dept. General Engineering, IlliGAL Report 95010, 1995.
    • Miller B.L., Shaw M.J., "Genetic Algorithms with dynamic Niche Sharing for Multimodal Function optimization", University Of Illinois at Urbana-Champaign, Dept. General Engineering, IlliGAL Report 95010, 1995.
  • 13
    • 14844301986 scopus 로고    scopus 로고
    • THOR: A tool to test intrusion detection systems by variations of attacks
    • Master's Thesis, Swiss Federal Institute of Technology, March
    • Marti R., "THOR: A tool to test intrusion detection systems by variations of attacks", Master's Thesis, Swiss Federal Institute of Technology, March 2002.
    • (2002)
    • Marti, R.1
  • 16
    • 33846287063 scopus 로고    scopus 로고
    • last accessed Mar 2005
    • Snort Web Site - www.snort.org. last accessed Mar 2005.
    • Snort Web Site
  • 17
    • 84958984156 scopus 로고    scopus 로고
    • Undermining an Anomaly-based Intrusion Detection System using Common Exploits
    • th International Symposium on Recent Advances in Intrusion Detection, RAID
    • th International Symposium on Recent Advances in Intrusion Detection - RAID, Lecture Notes in Computer Science, LNCS 2516, pp 54-73, 2002.
    • (2002) Lecture Notes in Computer Science, LNCS , vol.2516 , pp. 54-73
    • Tan, K.M.C.1    Killourhy, K.S.2    Maxion, R.A.3
  • 19
    • 0038011184 scopus 로고    scopus 로고
    • Mimicry Attacks on Host-based Intrusion Detection Systems
    • Wagner, D., Soto, P., "Mimicry Attacks on Host-based Intrusion Detection Systems", ACM Conference on Computer Security, pp 255-264, 2002.
    • (2002) ACM Conference on Computer Security , pp. 255-264
    • Wagner, D.1    Soto, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.