메뉴 건너뛰기




Volumn 2005, Issue , 2005, Pages 215-224

Automatic generation of buffer overflow attack signatures: An approach based on program behavior models

Author keywords

[No Author keywords available]

Indexed keywords

BUFFER OVERFLOW; NETWORK BASED ATTACKS;

EID: 33846294027     PISSN: 10639527     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSAC.2005.12     Document Type: Conference Paper
Times cited : (36)

References (40)
  • 1
    • 33846321443 scopus 로고    scopus 로고
    • The PaX team
    • The PaX team, http://pax.grsecurity.net.
  • 2
    • 18744376889 scopus 로고    scopus 로고
    • E. Barrantes et al. Randomized instruction set emulation to disrupt binary code injection attacks. In CCS, 2003.
    • E. Barrantes et al. Randomized instruction set emulation to disrupt binary code injection attacks. In CCS, 2003.
  • 3
    • 84862209017 scopus 로고    scopus 로고
    • Address obfuscation: An efficient approach to combat a broad range of memory error exploits
    • S. Bhatkar, D. DuVarney, and R. Sekar. Address obfuscation: An efficient approach to combat a broad range of memory error exploits. In USENIX Security, 2003.
    • (2003) USENIX Security
    • Bhatkar, S.1    DuVarney, D.2    Sekar, R.3
  • 4
    • 84954188728 scopus 로고    scopus 로고
    • Efficient techniques for comprehensive protection from memory error exploits
    • S. Bhatkar, R. Sekar, and D. DuVarney. Efficient techniques for comprehensive protection from memory error exploits. In USENIX Security, 2005.
    • (2005) USENIX Security
    • Bhatkar, S.1    Sekar, R.2    DuVarney, D.3
  • 5
    • 0035017559 scopus 로고    scopus 로고
    • RAD: A compile-time solution to buffer overflow attacks
    • T. Chiueh and F. Hsu. RAD: A compile-time solution to buffer overflow attacks. In ICDCS, 2001.
    • (2001) ICDCS
    • Chiueh, T.1    Hsu, F.2
  • 6
    • 84885679117 scopus 로고    scopus 로고
    • Vigilante: End-to-end containment of Internet worms
    • M. Costa et al. Vigilante: End-to-end containment of Internet worms, In SOSP, 2005.
    • (2005) SOSP
    • Costa, M.1
  • 7
    • 85084160243 scopus 로고    scopus 로고
    • StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks
    • C. Cowan et al. StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks. In USENIX Security, 1998.
    • (1998) USENIX Security
    • Cowan, C.1
  • 9
    • 33846325324 scopus 로고    scopus 로고
    • Anomaly detection using call stack information
    • H. Feng et al. Anomaly detection using call stack information. In IEEE S&P, 2003.
    • (2003) IEEE S&P
    • Feng, H.1
  • 10
    • 33846312311 scopus 로고    scopus 로고
    • Efficient context-sensitive intrusion detection
    • J. Giffin, S. Jha, and B. Miller. Efficient context-sensitive intrusion detection. In NDSS, 2004.
    • (2004) NDSS
    • Giffin, J.1    Jha, S.2    Miller, B.3
  • 11
    • 33745777666 scopus 로고    scopus 로고
    • CTCP: A centralized TCP/IP architecture for networking security
    • F. Hsu and T. Chiueh. CTCP: A centralized TCP/IP architecture for networking security. In ACSAC, 2004.
    • (2004) ACSAC
    • Hsu, F.1    Chiueh, T.2
  • 13
    • 12544250338 scopus 로고    scopus 로고
    • Backwards-compatible bounds checking for arrays and pointers in C programs
    • R. Jones and P. Kelly. Backwards-compatible bounds checking for arrays and pointers in C programs, In Intl. Workshop on Automated Debugging, 1997.
    • (1997) Intl. Workshop on Automated Debugging
    • Jones, R.1    Kelly, P.2
  • 14
    • 14844317200 scopus 로고    scopus 로고
    • Countering code-injection attacks with instruction-set randomization
    • G. Kc, A. Keromytis, and V. Prevelakis. Countering code-injection attacks with instruction-set randomization, In ACM CCS, 2003.
    • (2003) ACM CCS
    • Kc, G.1    Keromytis, A.2    Prevelakis, V.3
  • 15
    • 85084163246 scopus 로고    scopus 로고
    • Autograph: Toward automated, distributed worm signature detection
    • H. Kim and B. Karp. Autograph: Toward automated, distributed worm signature detection. In USENIX Security, 2004.
    • (2004) USENIX Security
    • Kim, H.1    Karp, B.2
  • 16
    • 33646048960 scopus 로고    scopus 로고
    • Honeycomb - creating intrusion detection signatures using honeypots
    • C. Kreibich and J. Crowcroft. Honeycomb - creating intrusion detection signatures using honeypots. In HotNets-II, 2003.
    • (2003) HotNets , vol.2
    • Kreibich, C.1    Crowcroft, J.2
  • 17
  • 18
    • 78650863969 scopus 로고    scopus 로고
    • Automatic synthesis of filters to discard buffer overflow attacks: A step towards realizing self-healing systems
    • Z. Liang, R. Sekar, and D. DuVarney. Automatic synthesis of filters to discard buffer overflow attacks: A step towards realizing self-healing systems. In USENIX Annual Technical Conference, (Short Paper) 2005.
    • (2005) USENIX Annual Technical Conference, (Short Paper)
    • Liang, Z.1    Sekar, R.2    DuVarney, D.3
  • 19
    • 33745800070 scopus 로고    scopus 로고
    • Z. Liang and R. Sekar. Fast and automated generation of attack signatures: A basis for building self-protecting servers. In CCS, 2005.
    • Z. Liang and R. Sekar. Fast and automated generation of attack signatures: A basis for building self-protecting servers. In CCS, 2005.
  • 21
    • 0036040304 scopus 로고    scopus 로고
    • CCured: Type-safe retrofitting of legacy code
    • G. Necula, S. McPeak, and W. Weimer. CCured: type-safe retrofitting of legacy code. In POPL, 2002.
    • (2002) POPL
    • Necula, G.1    McPeak, S.2    Weimer, W.3
  • 22
    • 33745772237 scopus 로고    scopus 로고
    • Polygraph: Automatically generating signatures for polymorphic worms
    • J. Newsome et al. Polygraph: Automatically generating signatures for polymorphic worms. In IEEE S&P, 2005.
    • (2005) IEEE S&P
    • Newsome, J.1
  • 23
    • 79953672829 scopus 로고    scopus 로고
    • Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
    • J. Newsome and D. Song. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In NDSS, 2005.
    • (2005) NDSS
    • Newsome, J.1    Song, D.2
  • 24
    • 26444472580 scopus 로고    scopus 로고
    • Buttercup: On network-based detection of polymorphic buffer overflow vulnerabilities
    • A. Pasupulati et al. Buttercup: On network-based detection of polymorphic buffer overflow vulnerabilities. In IEEE/IFIP Network Operation and Management Symposium, 2004.
    • (2004) IEEE/IFIP Network Operation and Management Symposium
    • Pasupulati, A.1
  • 25
    • 2642547913 scopus 로고    scopus 로고
    • On-line intrusion detection and attack prevention using diversity, generate-and-test, and generalization
    • J. Reynolds et al. On-line intrusion detection and attack prevention using diversity, generate-and-test, and generalization. Hawaii Intl. Conference on System Sciences, 2003.
    • (2003) Hawaii Intl. Conference on System Sciences
    • Reynolds, J.1
  • 26
    • 21644473822 scopus 로고    scopus 로고
    • A dynamic technique for eliminating buffer overflow vulnerabilities (and other memory errors)
    • M. Rinard et al. A dynamic technique for eliminating buffer overflow vulnerabilities (and other memory errors). In ACSAC, 2004.
    • (2004) ACSAC
    • Rinard, M.1
  • 27
    • 77954504457 scopus 로고    scopus 로고
    • A practical dynamic buffer overflow detector
    • O. Ruwase and M. Lam. A practical dynamic buffer overflow detector. In NDSS, 2004.
    • (2004) NDSS
    • Ruwase, O.1    Lam, M.2
  • 28
    • 20444442399 scopus 로고    scopus 로고
    • A fast automaton-based method for detecting anomalous program behaviors
    • R. Sekar et al. A fast automaton-based method for detecting anomalous program behaviors. In IEEE S&P, 2001.
    • (2001) IEEE S&P
    • Sekar, R.1
  • 29
    • 84944412883 scopus 로고    scopus 로고
    • A network worm vaccine architecture
    • S. Sidiroglou and A. Keromytis. A network worm vaccine architecture. In WETICE, 2003.
    • (2003) WETICE
    • Sidiroglou, S.1    Keromytis, A.2
  • 31
    • 84991765629 scopus 로고    scopus 로고
    • Automated worm fingerprinting
    • S. Singh et al. Automated worm fingerprinting. In OSDI, 2004.
    • (2004) OSDI
    • Singh, S.1
  • 32
    • 85180409373 scopus 로고    scopus 로고
    • DIRA: Automatic detection, identification and repair of control-hijacking attacks
    • A. Smirnov and T. Chiueh. DIRA: Automatic detection, identification and repair of control-hijacking attacks. In NDSS, 2005.
    • (2005) NDSS
    • Smirnov, A.1    Chiueh, T.2
  • 33
    • 25844462447 scopus 로고    scopus 로고
    • Defending against Internet worms: A signature-based approach
    • Y. Tang and S. Chen. Defending against Internet worms: A signature-based approach. In INFOCOM, 2005.
    • (2005) INFOCOM
    • Tang, Y.1    Chen, S.2
  • 34
    • 1642268792 scopus 로고    scopus 로고
    • Accurate buffer overflow detection via abstract payload execution, la
    • T. Toth and C. Kruegel. Accurate buffer overflow detection via abstract payload execution, la. RAID, 2002.
    • (2002) RAID
    • Toth, T.1    Kruegel, C.2
  • 35
    • 35048812546 scopus 로고    scopus 로고
    • Intrusion detection via static analysis
    • D. Wagner and D. Dean. Intrusion detection via static analysis. In IEEE S&P, 2001.
    • (2001) IEEE S&P
    • Wagner, D.1    Dean, D.2
  • 36
    • 27544510809 scopus 로고    scopus 로고
    • Shield: Vulnerability-driven network filters for preventing known vulnerability exploits
    • H. Wang et al. Shield: Vulnerability-driven network filters for preventing known vulnerability exploits. In SIGCOMM, 2004.
    • (2004) SIGCOMM
    • Wang, H.1
  • 37
    • 30344438592 scopus 로고    scopus 로고
    • Anomalous payload-based network intrusion detection
    • K. Wang and S. Stolfo. Anomalous payload-based network intrusion detection. In RAID, 2004.
    • (2004) RAID
    • Wang, K.1    Stolfo, S.2
  • 38
    • 33745803872 scopus 로고    scopus 로고
    • J. Xu, P. Ning, C. Kil, Y. Zhai, and C. Bookholt. Automatic diagnosis and response to memory corruption vulnerabilities. In CCS, 2005.
    • J. Xu, P. Ning, C. Kil, Y. Zhai, and C. Bookholt. Automatic diagnosis and response to memory corruption vulnerabilities. In CCS, 2005.
  • 39
    • 20344383014 scopus 로고    scopus 로고
    • W. Xu, D. DuVarney, and R. Sekar. An efficient and backwards-compatible transformation to ensure memory safety of C programs. In FSE, 2004.
    • W. Xu, D. DuVarney, and R. Sekar. An efficient and backwards-compatible transformation to ensure memory safety of C programs. In FSE, 2004.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.