메뉴 건너뛰기




Volumn 2006, Issue , 2006, Pages 38-45

Provenance-aware tracing of worm break-in and contaminations: A process coloring approach

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATIONAL METHODS; DATA TRANSFER; ELECTRONIC CRIME COUNTERMEASURES; INTERNET; SERVERS;

EID: 33947629208     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICDCS.2006.69     Document Type: Conference Paper
Times cited : (56)

References (27)
  • 1
    • 33947623904 scopus 로고    scopus 로고
    • SANS Institute
    • SANS Institute: Lion worm. http://www.sans.com/y2k/lion.htm.
    • Lion worm
  • 2
    • 33947675542 scopus 로고    scopus 로고
    • June
    • SARS Worms, http://www.xfocus.net/tools/200306/413.html, June 2003.
    • (2003)
    • Worms, S.A.R.S.1
  • 3
    • 0036709428 scopus 로고    scopus 로고
    • Recovery from Malicious Transactions
    • P. Ammann, S. Jajodia, and P. Liu. Recovery from Malicious Transactions. IEEE TKDE, Volume 14, Issue. 5, 2002.
    • (2002) IEEE TKDE , vol.14 , Issue.5
    • Ammann, P.1    Jajodia, S.2    Liu, P.3
  • 7
    • 84889030419 scopus 로고    scopus 로고
    • Shredding Your Garbage: Reducing Data Lifetime Through Secure Deallocation
    • Aug
    • J. Chow, B. Pfaff, T. Garfinkel, and M. Rosenblum. Shredding Your Garbage: Reducing Data Lifetime Through Secure Deallocation. USENIX Security Symp., Aug. 2005.
    • (2005) USENIX Security Symp
    • Chow, J.1    Pfaff, B.2    Garfinkel, T.3    Rosenblum, M.4
  • 11
    • 11844249640 scopus 로고    scopus 로고
    • ReVirt: Enabling Intrusion Analysis Through Virtual-Machine Logging and Replay
    • Dec
    • G. W. Dunlap, S. T. King, S. Cinar, M. A. Basrai, and P. M. Chen. ReVirt: Enabling Intrusion Analysis Through Virtual-Machine Logging and Replay. USENIX OSDI, Dec. 2002.
    • (2002) USENIX OSDI
    • Dunlap, G.W.1    King, S.T.2    Cinar, S.3    Basrai, M.A.4    Chen, P.M.5
  • 12
    • 0042078549 scopus 로고    scopus 로고
    • E. N. Elnozahy, L. Alvisi, Y.-M. Wang, and D. B. Johnson. A Survey of Rollback-Recovery Protocols in Message Passing Systems. ACM Computing Survey, 34(3), 2002.
    • E. N. Elnozahy, L. Alvisi, Y.-M. Wang, and D. B. Johnson. A Survey of Rollback-Recovery Protocols in Message Passing Systems. ACM Computing Survey, 34(3), 2002.
  • 13
    • 85080362568 scopus 로고    scopus 로고
    • A Virtual Machine Introspection Based Architecture for Intrusion Detection
    • Feb
    • T. Garfinkel and M. Rosenblum. A Virtual Machine Introspection Based Architecture for Intrusion Detection NDSS 2003, Feb. 2003.
    • (2003) NDSS 2003
    • Garfinkel, T.1    Rosenblum, M.2
  • 14
    • 33947629948 scopus 로고    scopus 로고
    • CERIAS Technical Report 2005-81, Purdue University
    • X. Jiang, A. Walters, F. Buchholz, D. Xu, Y. Wang, and E. Spafford. Provenance-Aware Tracing of Worm Break-in and Contaminations: A Process Coloring Approach. CERIAS Technical Report 2005-81, Purdue University, 2005.
    • (2005)
    • Jiang, X.1    Walters, A.2    Buchholz, F.3    Xu, D.4    Wang, Y.5    Spafford, E.6
  • 15
    • 33947652947 scopus 로고    scopus 로고
    • Virtual Playgrounds for Worm Behavior Investigation
    • Sept
    • X. Jiang, D. Xu, H. J. Wang, and E. H. Spafford. Virtual Playgrounds for Worm Behavior Investigation. RAID 2005, Sept. 2005.
    • (2005) RAID 2005
    • Jiang, X.1    Xu, D.2    Wang, H.J.3    Spafford, E.H.4
  • 17
  • 18
    • 85180415006 scopus 로고    scopus 로고
    • Enriching Intrusion Alerts Through Multi-Host Causality
    • Feb
    • S. T. King, Z. M. Mao, D. G. Lucchetti, and P. M. Chen. Enriching Intrusion Alerts Through Multi-Host Causality. NDSS 2005, Feb. 2005.
    • (2005) NDSS 2005
    • King, S.T.1    Mao, Z.M.2    Lucchetti, D.G.3    Chen, P.M.4
  • 19
    • 79953672829 scopus 로고    scopus 로고
    • Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software
    • Feb
    • J. Newsome and D. Song. Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software. NDSS 2005, Feb. 2005.
    • (2005) NDSS 2005
    • Newsome, J.1    Song, D.2
  • 22
    • 84878346861 scopus 로고    scopus 로고
    • Improving Host Security with System Call Policies
    • Aug
    • N. Provos. Improving Host Security with System Call Policies. USENIX Security Symp., Aug. 2003.
    • (2003) USENIX Security Symp
    • Provos, N.1
  • 23
    • 33748537883 scopus 로고    scopus 로고
    • Pioneer: Verifying Integrity and Guaranteeing Execution of Code on Legacy Platforms
    • Oct
    • A. Seshadri, M. Luk, E. Shi, A. Perrig, L. van Doom, and P. Khosla. Pioneer: Verifying Integrity and Guaranteeing Execution of Code on Legacy Platforms. ACM SOSP 2005, Oct. 2005.
    • (2005) ACM SOSP 2005
    • Seshadri, A.1    Luk, M.2    Shi, E.3    Perrig, A.4    van Doom, L.5    Khosla, P.6
  • 25
    • 0038011184 scopus 로고    scopus 로고
    • Mimicry Attacks on Host-Based Intrusion Detection Systems
    • Nov
    • D. Wagner and P. Soto. Mimicry Attacks on Host-Based Intrusion Detection Systems. ACM CCS 2002, Nov. 2002.
    • (2002) ACM CCS 2002
    • Wagner, D.1    Soto, P.2
  • 26
    • 33751063484 scopus 로고    scopus 로고
    • Configuration Debugging as Search: Finding the Needle in the Haystack
    • Dec
    • A. Whitaker, R. S. Cox, and S. D. Gribble. Configuration Debugging as Search: Finding the Needle in the Haystack. USENIX OSDI 2004, Dec. 2004.
    • (2004) USENIX OSDI 2004
    • Whitaker, A.1    Cox, R.S.2    Gribble, S.D.3
  • 27
    • 49449113941 scopus 로고    scopus 로고
    • Design, Implementation and Evaluation of Repairable File Service
    • June
    • N. Zhu and T. Chiueh. Design, Implementation and Evaluation of Repairable File Service. IEEE DSN 2003, June 2003.
    • (2003) IEEE DSN 2003
    • Zhu, N.1    Chiueh, T.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.