메뉴 건너뛰기




Volumn , Issue , 2006, Pages 15-27

Argos: An emulator for fingerprinting zero-day attacks for advertised honeypots with automatic signature generation

Author keywords

Design; Experimentation; Performance; Security

Indexed keywords

AUTOMATION; COMPUTER OPERATING SYSTEMS; GLOBAL OPTIMIZATION; INTRUSION DETECTION; PUBLIC POLICY; RELIABILITY THEORY;

EID: 34748920692     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1217935.1217938     Document Type: Conference Paper
Times cited : (115)

References (43)
  • 3
    • 0006100649 scopus 로고    scopus 로고
    • Smashing the stack for fun and profit
    • November
    • Aleph One. Smashing the stack for fun and profit. Phrack Magazine, 7(49), November 1996.
    • (1996) Phrack Magazine , vol.7 , Issue.49
    • One, A.1
  • 4
    • 34748845128 scopus 로고    scopus 로고
    • C. C. A. W. Alex Ho, Michael Fetterman and S. Hand. Practical taint-based protection using demand emulation. In Proc. of the 1st EuroSys Conference, Arpil 2006.
    • C. C. A. W. Alex Ho, Michael Fetterman and S. Hand. Practical taint-based protection using demand emulation. In Proc. of the 1st EuroSys Conference, Arpil 2006.
  • 5
    • 85063636742 scopus 로고    scopus 로고
    • F. Bellard. QEMU, a fast and portable dynamic translator. In In Proc. of the USENIX Annual Technical Conference, pages 41-46, April 2005.
    • F. Bellard. QEMU, a fast and portable dynamic translator. In In Proc. of the USENIX Annual Technical Conference, pages 41-46, April 2005.
  • 7
    • 34748814203 scopus 로고    scopus 로고
    • bulba and Kil3r. Bypassing Stackguard and Stackshield. Phrack Magazine, 10(56), January 2000.
    • bulba and Kil3r. Bypassing Stackguard and Stackshield. Phrack Magazine, 10(56), January 2000.
  • 9
    • 85084161775 scopus 로고    scopus 로고
    • C. Cowan, M. Barringer, S. Beattie and G. Kroah-Hartman. FormatGuard: Automatic protection from printf format string vulnerabilities. In In Proc. of the 10th Usenix Security Symposium, August 2001.
    • C. Cowan, M. Barringer, S. Beattie and G. Kroah-Hartman. FormatGuard: Automatic protection from printf format string vulnerabilities. In In Proc. of the 10th Usenix Security Symposium, August 2001.
  • 10
    • 85009448253 scopus 로고    scopus 로고
    • C. Cowan, S. Beattie, J. Johansen and P. Wagle. Point Guard: Protecting pointers from buffer overflow vulnerabilities. In In Proc. of the 12th USENIX Security Symposium, pages 91-104, August 2003.
    • C. Cowan, S. Beattie, J. Johansen and P. Wagle. Point Guard: Protecting pointers from buffer overflow vulnerabilities. In In Proc. of the 12th USENIX Security Symposium, pages 91-104, August 2003.
  • 11
    • 34748830204 scopus 로고    scopus 로고
    • M. Conover. w00w00 on heap overflows. http://www.w00w00.org/articles. html, January 1999.
    • M. Conover. w00w00 on heap overflows. http://www.w00w00.org/articles. html, January 1999.
  • 12
    • 21644482450 scopus 로고    scopus 로고
    • J. R. Crandall and F. T. Chong. Minos: Control data attack prevention orthogonal to memory model. In In Proc. of the 37th annual International Symposium on Microarchitecture, pages 221-232, 2004.
    • J. R. Crandall and F. T. Chong. Minos: Control data attack prevention orthogonal to memory model. In In Proc. of the 37th annual International Symposium on Microarchitecture, pages 221-232, 2004.
  • 17
    • 33845428560 scopus 로고    scopus 로고
    • Secure program execution via dynamic information flow tracking
    • 86-96, December, SESSION: Security
    • G. E. Suh, J. W. Lee, D. Zhang and S. Devadas. Secure program execution via dynamic information flow tracking. ACM SIGOPS Operating Systems Review, 38(5):86-96, December 2004. SESSION: Security.
    • (2004) ACM SIGOPS Operating Systems Review , vol.38 , Issue.5
    • Suh, G.E.1    Lee, J.W.2    Zhang, D.3    Devadas, S.4
  • 18
    • 14844317200 scopus 로고    scopus 로고
    • G. S. Kc, A. D. Keromytis, and V. Prevelakis. Countering code-injection attacks with instruction-set randomization. In In Proc. of the ACM Computer and Communications Security (CCS) Conference, pages 272-280, October 2003.
    • G. S. Kc, A. D. Keromytis, and V. Prevelakis. Countering code-injection attacks with instruction-set randomization. In In Proc. of the ACM Computer and Communications Security (CCS) Conference, pages 272-280, October 2003.
  • 20
    • 34748857244 scopus 로고    scopus 로고
    • T. Garfinkel and M. Rosenblum. A virtual machine introspection based architecture for intrusion detection. In In Proc. of the 10th ISOC Symposium on Network and Distributed Systems Security (SNDSS), February 2003.
    • T. Garfinkel and M. Rosenblum. A virtual machine introspection based architecture for intrusion detection. In In Proc. of the 10th ISOC Symposium on Network and Distributed Systems Security (SNDSS), February 2003.
  • 21
    • 34748842480 scopus 로고    scopus 로고
    • Advances in format string exploitation
    • July
    • gera and riq. Advances in format string exploitation. Phrack Magazine, 11(59), July 2002.
    • (2002) Phrack Magazine , vol.11 , Issue.59
    • gera1    riq2
  • 23
    • 85084163246 scopus 로고    scopus 로고
    • K. Hyang-Ah and B. Karp. Autograph: Toward automated, distributed worm signature detection. In In Proc. of the 13th USENIX Security Symposium, 2004.
    • K. Hyang-Ah and B. Karp. Autograph: Toward automated, distributed worm signature detection. In In Proc. of the 13th USENIX Security Symposium, 2004.
  • 24
    • 18844437024 scopus 로고    scopus 로고
    • J. C. Rabek, R. I. Khazan, S. M. Lewandowski and R. K. Cunningham. Detection of injected, dynamically generated, and obfuscated malicious code. In In Proc. of the ACM workshop on Rapid Malcode, 2003.
    • J. C. Rabek, R. I. Khazan, S. M. Lewandowski and R. K. Cunningham. Detection of injected, dynamically generated, and obfuscated malicious code. In In Proc. of the ACM workshop on Rapid Malcode, 2003.
  • 25
    • 18744376132 scopus 로고    scopus 로고
    • GCC extension for protecting applications from stack-smashing attacks
    • Technical report, IBM, June 2000
    • J. Etoh. GCC extension for protecting applications from stack-smashing attacks. Technical report, IBM, June 2000.
    • Etoh, J.1
  • 26
    • 34748877074 scopus 로고    scopus 로고
    • Remote windows kernel exploitation - step into the ring 0
    • B. Jack. Remote windows kernel exploitation - step into the ring 0. eEye Digital Security Whitepaper, www.eeye.com/~data/publish/whitepapers/research/ 0T20050205.FILE.pdf, 2005.
    • (2005) eEye Digital Security Whitepaper
    • Jack, B.1
  • 29
    • 85084163372 scopus 로고    scopus 로고
    • M. Frantzen and M. Shuey. StackGhost: Hardware facilitated stack protection. In In Proc. of the 10th USENIX Security Symposium, pages 55-66, August 2001.
    • M. Frantzen and M. Shuey. StackGhost: Hardware facilitated stack protection. In In Proc. of the 10th USENIX Security Symposium, pages 55-66, August 2001.
  • 30
    • 0037702242 scopus 로고    scopus 로고
    • N. Dor, M. Rodeh, and M. Sagiv. CSSV: Towards a realistic tool for statically detecting all buffer overlows in C. In In Proc. of the ACM Conference on Object-Oriented Programming, Systems, Languages and Application, October 2003.
    • N. Dor, M. Rodeh, and M. Sagiv. CSSV: Towards a realistic tool for statically detecting all buffer overlows in C. In In Proc. of the ACM Conference on Object-Oriented Programming, Systems, Languages and Application, October 2003.
  • 32
    • 34748857243 scopus 로고    scopus 로고
    • SweetBait: Zero-Hour Worm Detection and Containment Using Honeypots, (An extended version of this report was accepted by Elsevier Journal on Computer Networks, Special Issue on Security through Self-Protecting and Self-Healing Systems), TR IR-CS-015
    • Technical report, Vrije Universiteit Amsterdam, May
    • G. Portokalidis and H. Bos. SweetBait: Zero-Hour Worm Detection and Containment Using Honeypots, (An extended version of this report was accepted by Elsevier Journal on Computer Networks, Special Issue on Security through Self-Protecting and Self-Healing Systems), TR IR-CS-015. Technical report, Vrije Universiteit Amsterdam, May 2005.
    • (2005)
    • Portokalidis, G.1    Bos, H.2
  • 34
    • 34748909934 scopus 로고    scopus 로고
    • rix. Smashing C++ VPTRS. Phrack Magazine, 10(56), January 2000.
    • rix. Smashing C++ VPTRS. Phrack Magazine, 10(56), January 2000.
  • 36
    • 84862209017 scopus 로고    scopus 로고
    • S. Bhatkar, D.C. Du Varney and R. Sekar. Address obfuscation: an efficient approach to combat a broad range of memory error exploits. In In Proc. of the 12th USENIX Security Symposium, pages 105-120, August 2003.
    • S. Bhatkar, D.C. Du Varney and R. Sekar. Address obfuscation: an efficient approach to combat a broad range of memory error exploits. In In Proc. of the 12th USENIX Security Symposium, pages 105-120, August 2003.
  • 37
    • 84991765629 scopus 로고    scopus 로고
    • S. Singh, C. Estan, G. Varghese and S. Savage. Automated worm fingerprinting. In In Proc. of the 6th USENIX Symposium on Operating Systems Design and Implementation (OSDI), pages 45-60, 2004.
    • S. Singh, C. Estan, G. Varghese and S. Savage. Automated worm fingerprinting. In In Proc. of the 6th USENIX Symposium on Operating Systems Design and Implementation (OSDI), pages 45-60, 2004.
  • 38
    • 34748884825 scopus 로고    scopus 로고
    • Using execution transactions to recover from buffer overflow attacks
    • Columbia, University
    • S. Sidiroglou and A. D. Keromytis. Using execution transactions to recover from buffer overflow attacks. Cucs-031-04, Columbia, University, 2004.
    • (2004) Cucs-031-04
    • Sidiroglou, S.1    Keromytis, A.D.2
  • 39
    • 34748831503 scopus 로고    scopus 로고
    • Win32 buffer overows (location, exploitation, and prevention)
    • D. Spyrit. Win32 buffer overows (location, exploitation, and prevention). Phrack 55, 1999.
    • (1999) Phrack , vol.55
    • Spyrit, D.1
  • 41
    • 85084164620 scopus 로고    scopus 로고
    • U. Shankar, K. Talwar, J. S. Foster, and D. Wagner. Detecting format string vulnerabilities with type qualifiers. In In Proc. of the 10th USENIX Security Symposium, pages 201-216, August 2001.
    • U. Shankar, K. Talwar, J. S. Foster, and D. Wagner. Detecting format string vulnerabilities with type qualifiers. In In Proc. of the 10th USENIX Security Symposium, pages 201-216, August 2001.
  • 42
    • 85084162336 scopus 로고    scopus 로고
    • V. Kiriansky, D. Bruening and S. Amarasinghe. Secure execution via program shepherding. In In Proc. of the 11th USENIX Security Symposium, 2002.
    • V. Kiriansky, D. Bruening and S. Amarasinghe. Secure execution via program shepherding. In In Proc. of the 11th USENIX Security Symposium, 2002.
  • 43
    • 84948951525 scopus 로고    scopus 로고
    • Throttling Viruses: Restricting Propagation to Defeat Malicious Mobile Code
    • Las Vegas, Nevada
    • M. M. Williamson. Throttling Viruses: Restricting Propagation to Defeat Malicious Mobile Code. In Proc. of ACSAC Security Conference, Las Vegas, Nevada, 2002.
    • (2002) Proc. of ACSAC Security Conference
    • Williamson, M.M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.