메뉴 건너뛰기




Volumn 2006, Issue , 2006, Pages 2-16

Towards automatic generation of vulnerability-based signatures

Author keywords

[No Author keywords available]

Indexed keywords

PATTERN MATCHING; PROBLEM SOLVING; SEMANTICS; SYNTACTICS;

EID: 33751056900     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SP.2006.41     Document Type: Conference Paper
Times cited : (201)

References (58)
  • 1
    • 33751042305 scopus 로고    scopus 로고
    • Dynamorio
    • Dynamorio. http://www.cag.lcs.mit.edu/dynamorio/.
  • 2
    • 33751045207 scopus 로고    scopus 로고
    • K2, admmutate
    • K2, admmutate. http://www.ktwo.ca/c/ADMmutate-0.8.4.tar.gz.
  • 3
    • 33751056518 scopus 로고    scopus 로고
    • Metasploit. http://metasploit.org.
  • 9
    • 0011209721 scopus 로고    scopus 로고
    • Modeling and verifying systems using a logic of counter arithmetic with lambda expressions and uninterpreted functions
    • R. E. Bryant, S. K. Lahiri, and S. A. Seshia. Modeling and verifying systems using a logic of counter arithmetic with lambda expressions and uninterpreted functions. In Proc. Computer-Aided Verification (CAV), 2002.
    • (2002) Proc. Computer-aided Verification (CAV)
    • Bryant, R.E.1    Lahiri, S.K.2    Seshia, S.A.3
  • 13
    • 35248891044 scopus 로고    scopus 로고
    • Precise analysis of string expressions
    • Proc. 10th International Static Analysis Symposium, SAS '03, Springer-Verlag, June
    • A. S. Christensen, A. Møller, and M. I. Schwartzbach. Precise analysis of string expressions. In Proc. 10th International Static Analysis Symposium, SAS '03, volume 2694 of LNCS, pages 1-18. Springer-Verlag, June 2003. Available from http://www.brics.dk/JSA/.
    • (2003) LNCS , vol.2694 , pp. 1-18
    • Christensen, A.S.1    Møller, A.2    Schwartzbach, M.I.3
  • 16
    • 35048861896 scopus 로고    scopus 로고
    • A tool for checking ANSI-C programs
    • K. Jensen and A. Podelski, editors, Tools and Algorithms for the Construction and Analysis of Systems (TACAS 2004), Springer
    • E. Clarke, D. Kroening, and F. Lerda. A tool for checking ANSI-C programs. In K. Jensen and A. Podelski, editors, Tools and Algorithms for the Construction and Analysis of Systems (TACAS 2004), volume 2988 of Lecture Notes in Computer Science, pages 168-176. Springer, 2004.
    • (2004) Lecture Notes in Computer Science , vol.2988 , pp. 168-176
    • Clarke, E.1    Kroening, D.2    Lerda, F.3
  • 31
    • 0016971687 scopus 로고
    • Symbolic execution and program testing
    • J. King. Symbolic execution and program testing. Communications of the ACM, 19:386-394, 1976.
    • (1976) Communications of the ACM , vol.19 , pp. 386-394
    • King, J.1
  • 46
    • 84882601711 scopus 로고    scopus 로고
    • r code
    • r code. ATPhttpd exploit. http://www.cotse.com/mailing-lists/todays/att- 0003/01-atphttp0x06.c.
    • ATPhttpd Exploit
  • 47
    • 33751040191 scopus 로고    scopus 로고
    • Y. Ramin. ATPhttpd.http://www.redshift.com/~yramin/atp/atphttpd/.
    • ATPhttpd
    • Ramin, Y.1
  • 53
    • 3342931131 scopus 로고    scopus 로고
    • Trace-driven memory simulation: A survey
    • R. A. Uhlig and T. Mudge. Trace-driven memory simulation: a survey. ACM Computing Surveys, 29, 1997.
    • (1997) ACM Computing Surveys , vol.29
    • Uhlig, R.A.1    Mudge, T.2
  • 57
    • 0020157396 scopus 로고
    • Programmers use slices when debugging
    • M. Weiser. Programmers use slices when debugging. Communications of the ACM, 25:446-452, 1982.
    • (1982) Communications of the ACM , vol.25 , pp. 446-452
    • Weiser, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.