메뉴 건너뛰기




Volumn , Issue , 2007, Pages 311-325

Creating vulnerability signatures using weakest preconditions

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER AIDED SOFTWARE ENGINEERING; INTRUSION DETECTION; POLYNOMIALS; TELECOMMUNICATION TRAFFIC;

EID: 35048885595     PISSN: 19401434     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSF.2007.17     Document Type: Conference Paper
Times cited : (66)

References (50)
  • 1
    • 33751060454 scopus 로고    scopus 로고
    • Automatically generating malicious disks using symbolic execution. In IEEE Symposium on Security and Privacy, 2006.
    • Automatically generating malicious disks using symbolic execution. In IEEE Symposium on Security and Privacy, 2006.
  • 3
    • 33846012075 scopus 로고
    • A. Aho, R. Sethi, and J. Ullman. Compilers:, Addison-Wesley Publishing Company
    • A. Aho, R. Sethi, and J. Ullman. Compilers: Principles, Techniques, and Tools. Addison-Wesley Publishing Company, 1986.
    • (1986) Principles, Techniques, and Tools
  • 6
    • 84885205652 scopus 로고    scopus 로고
    • Weakest-precondition of unstructured programs
    • M. Barnett and K. R. M. Leino. Weakest-precondition of unstructured programs. In PASTE, 2005.
    • (2005) PASTE
    • Barnett, M.1    Leino, K.R.M.2
  • 7
    • 35048835830 scopus 로고    scopus 로고
    • C. Barrett and S. Berezin. CVC Lite: A new implementation of the cooperating validity checker. In R. Alur and D. A. Peled, editors, CAV, Lecture Notes in Computer Science. Springer, 2004.
    • C. Barrett and S. Berezin. CVC Lite: A new implementation of the cooperating validity checker. In R. Alur and D. A. Peled, editors, CAV, Lecture Notes in Computer Science. Springer, 2004.
  • 8
    • 35048837015 scopus 로고    scopus 로고
    • S. P. Berry. Shoki intrusion detection system, shoki. sf. net
    • S. P. Berry. Shoki intrusion detection system, shoki. sf. net.
  • 10
    • 34548772699 scopus 로고    scopus 로고
    • Towards automatically identifying trigger-based behavior in malware using symbolic execution and binary analysis
    • Technical Report CMU-CS-07-105, Carnegie Mellon University School of Computer Science, January
    • D. Brumley, C. Hartwig, Z. Liang, J. Newsome, D. Song, and H. Yin. Towards automatically identifying trigger-based behavior in malware using symbolic execution and binary analysis. Technical Report CMU-CS-07-105, Carnegie Mellon University School of Computer Science, January 2007.
    • (2007)
    • Brumley, D.1    Hartwig, C.2    Liang, Z.3    Newsome, J.4    Song, D.5    Yin, H.6
  • 11
    • 35048903951 scopus 로고    scopus 로고
    • Alias analysis for assembly
    • Technical Report CMU-CS-06-180, Carnegie Mellon University School of Computer Science
    • D. Brumley and J. Newsome. Alias analysis for assembly. Technical Report CMU-CS-06-180, Carnegie Mellon University School of Computer Science, 2006.
    • (2006)
    • Brumley, D.1    Newsome, J.2
  • 14
    • 35048881888 scopus 로고    scopus 로고
    • CISCO, string matching signatures
    • CISCO. Cisco secure intrusion detection system director -string matching signatures, http://www.cisco.com/ univercd/cc/td/doc/product/iaabu/csids/ csids5/csidscog/sigs.htm#wp1015446.
    • Cisco secure intrusion detection system director
  • 18
    • 0004207324 scopus 로고    scopus 로고
    • Extended static checking
    • Technical Report 159, Compaq Systems Research Center, December
    • D. Detlefs, K. R. M. Leino, G. Nelson, and J. Saxe. Extended static checking. Technical Report 159, Compaq Systems Research Center, December 1998.
    • (1998)
    • Detlefs, D.1    Leino, K.R.M.2    Nelson, G.3    Saxe, J.4
  • 20
    • 35048897380 scopus 로고    scopus 로고
    • H. Doli. iwconfig vulnerability (wireless tools v.26). http://eve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-094 7, 2003.
    • H. Doli. iwconfig vulnerability (wireless tools v.26). http://eve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-094 7, 2003.
  • 25
    • 35048888881 scopus 로고    scopus 로고
    • A. Ireland and J. Stark, the automatic discovery of loop invariants. In Fourth NASA Langley formal methods workshop, 1997.
    • A. Ireland and J. Stark, the automatic discovery of loop invariants. In Fourth NASA Langley formal methods workshop, 1997.
  • 29
    • 13844267476 scopus 로고    scopus 로고
    • Efficient weakest preconditions
    • K. R. M. Leino. Efficient weakest preconditions. Information Processing Letters, 93(6):281-288, 2005.
    • (2005) Information Processing Letters , vol.93 , Issue.6 , pp. 281-288
    • Leino, K.R.M.1
  • 38
    • 35048865242 scopus 로고    scopus 로고
    • L. I. on Demand. K rustan leino and francesco logozzo. In The Third Asian Symposium on Programming Languages and Systems, 2005.
    • L. I. on Demand. K rustan leino and francesco logozzo. In The Third Asian Symposium on Programming Languages and Systems, 2005.
  • 39
    • 35048880876 scopus 로고    scopus 로고
    • V. Paxson. Bro: A. system, for detecting network intruders in real-time, computer networks, 31, December 1999.
    • V. Paxson. Bro: A. system, for detecting network intruders in real-time, computer networks, 31, December 1999.
  • 41
    • 35048862260 scopus 로고    scopus 로고
    • r-code. ATPhttpd exploit. http://www.cotse.com/mailing-lists/todays/att- 0003/01-atphttp0x06.c.
    • r-code. ATPhttpd exploit. http://www.cotse.com/mailing-lists/todays/att- 0003/01-atphttp0x06.c.
  • 44
    • 12844267418 scopus 로고    scopus 로고
    • Secure program execution via dynamic information flow tracking
    • G. E. Suh, J. Lee, and S. Devadas. Secure program execution via dynamic information flow tracking. In Proceedings of ASPLOS, 2004.
    • (2004) Proceedings of ASPLOS
    • Suh, G.E.1    Lee, J.2    Devadas, S.3
  • 46
    • 35048839154 scopus 로고    scopus 로고
    • K. Takeda. Pakemon intrusion detection system, http://www.inas.mag.keio. ac.jp/ids/pakemon/index.html. referenced by http://www.whit.ehats.com/ids/.
    • K. Takeda. Pakemon intrusion detection system, http://www.inas.mag.keio. ac.jp/ids/pakemon/index.html. referenced by http://www.whit.ehats.com/ids/.
  • 48
    • 35048850818 scopus 로고    scopus 로고
    • US-CERT. Vulnerability note vu#196945 - isc bind 8 contains buffer overflow in transaction signature (tsig) handling code, http://www.kb.cert.org/ vuls/id/196945.
    • US-CERT. Vulnerability note vu#196945 - isc bind 8 contains buffer overflow in transaction signature (tsig) handling code, http://www.kb.cert.org/ vuls/id/196945.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.