메뉴 건너뛰기




Volumn , Issue , 2007, Pages 115-128

Sweeper: A lightweight end-to-end system for defending against fast worms

Author keywords

Antibody; Dynamic instrumentation; Flash worm; VSEF

Indexed keywords

BINARY CODES; COMPUTER CRIME; REAL TIME SYSTEMS; SECURITY OF DATA; SERVERS; SUPERVISORY AND EXECUTIVE PROGRAMS; BINARY SEQUENCES; INSTRUMENTS; NETWORK SECURITY;

EID: 34548043748     PISSN: 01635980     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1272996.1273010     Document Type: Conference Paper
Times cited : (27)

References (57)
  • 1
    • 34548020919 scopus 로고    scopus 로고
    • Dyninst. www.dyninst.org.
    • Dyninst
  • 2
    • 34548027679 scopus 로고    scopus 로고
    • PaX. http://pax.grsecurity.net/.
    • PaX. http
  • 3
    • 84862209017 scopus 로고    scopus 로고
    • Address obfuscation: An efficient approach to combat a broad range of memory error exploits
    • S. Bhatkar, D. C. DuVarney, and R. Sekar. Address obfuscation: an efficient approach to combat a broad range of memory error exploits. In 12th USENIX Security Symposium, 2003.
    • (2003) 12th USENIX Security Symposium
    • Bhatkar, S.1    DuVarney, D.C.2    Sekar, R.3
  • 4
    • 84954188728 scopus 로고    scopus 로고
    • Efficient techniques for comprehensive protection from memory error exploits
    • Baltimore, MD
    • S. Bhatkar, R. Sekar, and D. C. DuVarney. Efficient techniques for comprehensive protection from memory error exploits. In 14th USENIX Security Symposium, Baltimore, MD, 2005.
    • (2005) 14th USENIX Security Symposium
    • Bhatkar, S.1    Sekar, R.2    DuVarney, D.C.3
  • 8
    • 34548040609 scopus 로고    scopus 로고
    • CERT
    • CERT. Blaster http://www.cert.org/advisories/CA-2003-20.html.
    • Blaster
  • 9
    • 34548028152 scopus 로고    scopus 로고
    • CERT
    • CERT. CodeRed http://www.cert.org/advisories/CA-2001-19.html.
    • CodeRed
  • 10
    • 34548019639 scopus 로고    scopus 로고
    • CERT
    • CERT. Slammer http://www.cert.org/advisories/CA-2003-04.html.
    • Slammer
  • 11
    • 34548049185 scopus 로고    scopus 로고
    • CERT/CC. CERT/CC statistics 1988-2005. http://www.cert.org/stats/ cert_stats.html.
    • CERT/CC. CERT/CC statistics 1988-2005. http://www.cert.org/stats/ cert_stats.html.
  • 12
    • 14944374640 scopus 로고    scopus 로고
    • Mitigating buffer overflows by operating system randomization
    • Technical report, Carnegie Mellon University
    • M. Chew and D. Song. Mitigating buffer overflows by operating system randomization. Technical report, Carnegie Mellon University, 2002.
    • (2002)
    • Chew, M.1    Song, D.2
  • 16
    • 33745788387 scopus 로고    scopus 로고
    • On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits
    • J. R. Crandall, Z. Su, S. F. Wu, and F. T. Chong. On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits. In CCS '05, 2005.
    • (2005) CCS '05
    • Crandall, J.R.1    Su, Z.2    Wu, S.F.3    Chong, F.T.4
  • 17
    • 34247170052 scopus 로고    scopus 로고
    • Backwards-compatible array bounds checking for c with very low overhe ad
    • D. Dhurjati and V. Adve. Backwards-compatible array bounds checking for c with very low overhe ad. In ICSE, 2006.
    • (2006) ICSE
    • Dhurjati, D.1    Adve, V.2
  • 18
    • 11844249640 scopus 로고    scopus 로고
    • Revirt: Enabling intrusion analysis through virtualmachine logging and replay
    • G. W. Dunlap, S. T. King, S. Cinar, M. Basrai, and P. M. Chen. Revirt: Enabling intrusion analysis through virtualmachine logging and replay. In OSDI'02, 2002.
    • (2002) OSDI'02
    • Dunlap, G.W.1    King, S.T.2    Cinar, S.3    Basrai, M.4    Chen, P.M.5
  • 20
    • 34548043893 scopus 로고    scopus 로고
    • Address obfuscation: An efficient approach to combat a broad range of memory error exploits
    • S. Forrest, A. Somayaji, and D. H. Ackley. Address obfuscation: an efficient approach to combat a broad range of memory error exploits. In HotOS, 1997.
    • (1997) HotOS
    • Forrest, S.1    Somayaji, A.2    Ackley, D.H.3
  • 23
    • 0034486891 scopus 로고    scopus 로고
    • The mathematics of infectious diseases
    • H. W. Hethcote. The mathematics of infectious diseases. SIAM Rev., 42(4):599-653, 2000.
    • (2000) SIAM Rev , vol.42 , Issue.4 , pp. 599-653
    • Hethcote, H.W.1
  • 24
    • 85084163246 scopus 로고    scopus 로고
    • Autograph: Toward automated, distributed worm signature detection
    • H.-A. Kim and B. Karp. Autograph: Toward automated, distributed worm signature detection. In the 13th Usenix Security Symposium, 2004.
    • (2004) the 13th Usenix Security Symposium
    • Kim, H.-A.1    Karp, B.2
  • 25
    • 85077373727 scopus 로고    scopus 로고
    • Debugging operating systems with time-traveling virtual machines
    • S. T. King, G. W. Dunlap, and P. M. Chen. Debugging operating systems with time-traveling virtual machines. In USENIX, 2005.
    • (2005) USENIX
    • King, S.T.1    Dunlap, G.W.2    Chen, P.M.3
  • 26
    • 33645791274 scopus 로고    scopus 로고
    • Honeycomb: Creating intrusion detection signatures using honeypots
    • C. Kreibich and J. Crowcroft. Honeycomb: creating intrusion detection signatures using honeypots. SIGCOMM Comput. Commun. Rev., 2004.
    • (2004) SIGCOMM Comput. Commun. Rev
    • Kreibich, C.1    Crowcroft, J.2
  • 28
    • 33745800070 scopus 로고    scopus 로고
    • Fast and automated generation of attack signatures: A basis for building self-protecting servers
    • Z. Liang and R. Sekar. Fast and automated generation of attack signatures: a basis for building self-protecting servers. In CCS '05, 2005.
    • (2005) CCS '05
    • Liang, Z.1    Sekar, R.2
  • 29
    • 34548037822 scopus 로고    scopus 로고
    • Free transactions with Rio Vista
    • D. E. Lowell and P. M. Chen. Free transactions with Rio Vista. In SOSP, 1997.
    • (1997) SOSP
    • Lowell, D.E.1    Chen, P.M.2
  • 31
    • 0036040304 scopus 로고    scopus 로고
    • CCured: Type-safe retrofitting of legacy code
    • G. C. Necula, S. McPeak, and W. Weimer. CCured: Type-safe retrofitting of legacy code. In POPL, 2002.
    • (2002) POPL
    • Necula, G.C.1    McPeak, S.2    Weimer, W.3
  • 32
    • 34548048541 scopus 로고    scopus 로고
    • N. Nethercote and J. Seward. Valgrind: A program supervision framework. In RV, 2003.
    • N. Nethercote and J. Seward. Valgrind: A program supervision framework. In RV, 2003.
  • 33
    • 84882740544 scopus 로고    scopus 로고
    • Vulnerability-specific execution filtering for exploit prevention on commodity software
    • J. Newsome, D. Brumley, and D. Song. Vulnerability-specific execution filtering for exploit prevention on commodity software. In NDSS, 2006.
    • (2006) NDSS
    • Newsome, J.1    Brumley, D.2    Song, D.3
  • 34
    • 33846893358 scopus 로고    scopus 로고
    • Paragraph: Thwarting signature learning by training maliciously
    • Sept
    • J. Newsome, B. Karp, and D. Song. Paragraph: Thwarting signature learning by training maliciously. In RAID, Sept. 2006.
    • (2006) RAID
    • Newsome, J.1    Karp, B.2    Song, D.3
  • 36
    • 79953672829 scopus 로고    scopus 로고
    • Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
    • J. Newsome and D. Song. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In NDSS, 2005.
    • (2005) NDSS
    • Newsome, J.1    Song, D.2
  • 38
    • 40349087553 scopus 로고    scopus 로고
    • LIFT: A low-overhead practical information flow tracking system for detecting general security attacks
    • Dec, To appear
    • F. Qin, H. Chen, Z. Li, Y. Zhou, H. seop Kim, and Y. Wu. LIFT: A low-overhead practical information flow tracking system for detecting general security attacks. In MICRO, Dec 2006. To appear.
    • (2006) MICRO
    • Qin, F.1    Chen, H.2    Li, Z.3    Zhou, Y.4    seop Kim, H.5    Wu, Y.6
  • 39
    • 28444490333 scopus 로고    scopus 로고
    • Safemem: Exploiting ECC-Memory for detecting memory leaks and memo ry corruption during production runs
    • F. Qin, S. Lu, and Y. Zhou. Safemem: Exploiting ECC-Memory for detecting memory leaks and memo ry corruption during production runs. In HPCA, 2005.
    • (2005) HPCA
    • Qin, F.1    Lu, S.2    Zhou, Y.3
  • 40
    • 84885578759 scopus 로고    scopus 로고
    • Rx: Treating bugs as allergies - A safe method to survive software failures
    • F. Qin, J. Tucek, J. Sundaresan, and Y. Zhou. Rx: Treating bugs as allergies - A safe method to survive software failures. In SOSP, 2005.
    • (2005) SOSP
    • Qin, F.1    Tucek, J.2    Sundaresan, J.3    Zhou, Y.4
  • 42
    • 14844328033 scopus 로고    scopus 로고
    • H. Shacham, M. Page, B. Pfaff, E.-J. Goh, N. Modadugu, and D. Boneh. On the effectiveness of address-space randomization. In CCS, 2004.
    • H. Shacham, M. Page, B. Pfaff, E.-J. Goh, N. Modadugu, and D. Boneh. On the effectiveness of address-space randomization. In CCS, 2004.
  • 45
    • 33845453072 scopus 로고    scopus 로고
    • Dira: Automatic detection, identification and repair of control-hijacking attacks
    • A. Smirnov and T. cker Chiueh. Dira: Automatic detection, identification and repair of control-hijacking attacks. In NDSS, 2005.
    • (2005) NDSS
    • Smirnov, A.1    cker Chiueh, T.2
  • 46
    • 79959917961 scopus 로고    scopus 로고
    • Flashback: A lightweight extension for rollback and deterministic replay for software debugging
    • S. M. Srinivasan, S. Kandula, C. R. Andrews, and Y. Zhou. Flashback: A lightweight extension for rollback and deterministic replay for software debugging. In USENIX, 2004.
    • (2004) USENIX
    • Srinivasan, S.M.1    Kandula, S.2    Andrews, C.R.3    Zhou, Y.4
  • 49
    • 0036926058 scopus 로고    scopus 로고
    • Libsafe: Transparent system-wide protection against buffer overflow attacks
    • T. K. Tsai and N. Singh. Libsafe: Transparent system-wide protection against buffer overflow attacks. In DSN, page 541, 2002.
    • (2002) DSN , pp. 541
    • Tsai, T.K.1    Singh, N.2
  • 50
    • 85053144389 scopus 로고    scopus 로고
    • US-CERT. Common vulnerabilities and exposures. [51] W. Vogels, D. Dumitriu, A. Agrawal, T. Chia, and K. Guo. Scalability of the Microsoft Cluster Service. In USENIX Windows NT Symposium, Aug 1998.
    • US-CERT. Common vulnerabilities and exposures. [51] W. Vogels, D. Dumitriu, A. Agrawal, T. Chia, and K. Guo. Scalability of the Microsoft Cluster Service. In USENIX Windows NT Symposium, Aug 1998.
  • 52
    • 0020157396 scopus 로고
    • Programmers use slices when debugging
    • M. Weiser. Programmers use slices when debugging. Commun. ACM, 25(7):446-452, 1982.
    • (1982) Commun. ACM , vol.25 , Issue.7 , pp. 446-452
    • Weiser, M.1
  • 53
    • 34247546866 scopus 로고    scopus 로고
    • A comparison of publicly available tools for dynamic buffer overflow prevention
    • J. Wilander and M. Kamkar. A comparison of publicly available tools for dynamic buffer overflow prevention. In NDSS, 2003.
    • (2003) NDSS
    • Wilander, J.1    Kamkar, M.2
  • 54
    • 27644552867 scopus 로고    scopus 로고
    • Transparent runtime randomization for security
    • Technical report, Center for Reliable and Higher Performance Computing, University of Illinois, May
    • J. Xu, Z. Kalbarczyk, and R. K. Iyer. Transparent runtime randomization for security. Technical report, Center for Reliable and Higher Performance Computing, University of Illinois, May 2003.
    • (2003)
    • Xu, J.1    Kalbarczyk, Z.2    Iyer, R.K.3
  • 55
    • 33745803872 scopus 로고    scopus 로고
    • Automatic diagnosis and response to memory corruption vulnerabilities
    • J. Xu, P. Ning, C. Kil, Y. Zhai, and C. Bookholt. Automatic diagnosis and response to memory corruption vulnerabilities. In CCS '05, 2005.
    • (2005) CCS '05
    • Xu, J.1    Ning, P.2    Kil, C.3    Zhai, Y.4    Bookholt, C.5
  • 56
    • 0038262825 scopus 로고    scopus 로고
    • Precise dynamic slicing algorithms
    • X. Zhang, R. Gupta, and Y. Zhang. Precise dynamic slicing algorithms. In ICSE, 2003.
    • (2003) ICSE
    • Zhang, X.1    Gupta, R.2    Zhang, Y.3
  • 57
    • 21644447484 scopus 로고    scopus 로고
    • AccMon: Automatically detecting memory-related bugs via program counter-based invariants
    • P. Zhou, W. Liu, F. Long, S. Lu, F. Qin, Y. Zhou, S. Midkiff, and J. Torrellas. AccMon: Automatically detecting memory-related bugs via program counter-based invariants. In MICRO, 2004.
    • (2004) MICRO
    • Zhou, P.1    Liu, W.2    Long, F.3    Lu, S.4    Qin, F.5    Zhou, Y.6    Midkiff, S.7    Torrellas, J.8


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.