메뉴 건너뛰기




Volumn 2005, Issue , 2005, Pages 343-349

Server protection through dynamic patching

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER SOFTWARE; COMPUTER WORMS; CONSTRAINT THEORY; INTERNET; PUBLIC KEY CRYPTOGRAPHY; SERVERS;

EID: 33847250029     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/PRDC.2005.56     Document Type: Conference Paper
Times cited : (3)

References (14)
  • 5
    • 33847274246 scopus 로고    scopus 로고
    • R. W. M. Jones and P. H. J. Kelly. Backward-compatible bounds checking for arrays and pointers in C programs. In Proceedings of the 3rd International Workshop on Automated and Algorithmic Debugging (AADEBUG), pages 13-26, Linköping, Sweden, May 1997.
    • R. W. M. Jones and P. H. J. Kelly. Backward-compatible bounds checking for arrays and pointers in C programs. In Proceedings of the 3rd International Workshop on Automated and Algorithmic Debugging (AADEBUG), pages 13-26, Linköping, Sweden, May 1997.
  • 6
    • 33847320183 scopus 로고    scopus 로고
    • D. Kegel, dkftpbench. http://www.kegel.com/dkftpbench/.
    • D. Kegel, dkftpbench. http://www.kegel.com/dkftpbench/.
  • 8
    • 3042642332 scopus 로고    scopus 로고
    • The advanced return-into-lib(c) exploits: PaX case study
    • Dec
    • Nergal. The advanced return-into-lib(c) exploits: PaX case study. Phrack, 11(58), Dec 2001.
    • (2001) Phrack , vol.11 , Issue.58
    • Nergal1
  • 9
    • 33847272647 scopus 로고    scopus 로고
    • PaX Project, Mar
    • PaX Project. Address space layout randomization, Mar 2003. http://pageexec.virtualave.net/docs/aslr.txt.
    • (2003) Address space layout randomization
  • 10
    • 0003673089 scopus 로고    scopus 로고
    • Monster in a box
    • Dec
    • D. Pescovitz. Monster in a box. Wired, 8(12), Dec. 2000.
    • (2000) Wired , vol.8 , Issue.12
    • Pescovitz, D.1
  • 12
    • 4344627335 scopus 로고    scopus 로고
    • The spread of the witty worm
    • July/Aug
    • C. Shannon and D. Moore. The spread of the witty worm. IEEE Security & Privacy, 2(4):46-50, July/Aug. 2004.
    • (2004) IEEE Security & Privacy , vol.2 , Issue.4 , pp. 46-50
    • Shannon, C.1    Moore, D.2
  • 13
    • 33847295754 scopus 로고    scopus 로고
    • Solar Designer. Getting around non-executable stack (and fix). Bugtraq Mailing List, Aug 1997.
    • Solar Designer. Getting around non-executable stack (and fix). Bugtraq Mailing List, Aug 1997.
  • 14
    • 84888844330 scopus 로고    scopus 로고
    • Sun Microsystems Inc
    • Sun Microsystems Inc. The Java HotSpot™ Technology. http://Java.sun.com/products/hotspot/.
    • The Java HotSpot™ Technology


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.