메뉴 건너뛰기




Volumn , Issue , 2007, Pages 418-425

An efficient technique for preventing mimicry and impossible paths execution attacks

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER OPERATING SYSTEMS; INTERFACES (COMPUTER); INTRUSION DETECTION; RESPONSE TIME (COMPUTER SYSTEMS); SERVERS; WORLD WIDE WEB;

EID: 36348944590     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/PCCC.2007.358922     Document Type: Conference Paper
Times cited : (14)

References (13)
  • 1
    • 36349018430 scopus 로고    scopus 로고
    • Syscalls Obfuscation to Prevent Automatic Mimicry
    • Technical report, Dipartimento di Informatica e Comunicazione, Università degli Studi di Milano
    • D. Bruschi, L. Cavallaro, and A. Lanzi. Syscalls Obfuscation to Prevent Automatic Mimicry. Technical report, Dipartimento di Informatica e Comunicazione, Università degli Studi di Milano, 2006.
    • (2006)
    • Bruschi, D.1    Cavallaro, L.2    Lanzi, A.3
  • 2
    • 14944374640 scopus 로고    scopus 로고
    • Mitigating Buffer Overflows by Operating System Randomization
    • Technical report, CMU department of computer science
    • M. Chew and D. Song. Mitigating Buffer Overflows by Operating System Randomization. Technical report, CMU department of computer science, 2002.
    • (2002)
    • Chew, M.1    Song, D.2
  • 4
    • 0029716418 scopus 로고    scopus 로고
    • S. Forrest, S. A. Hofmeyr, A. Somayaji, andT. A. Longstaff. A Sense of Self for Unix Processes. In SP '96: Proceedings of the 1996 IEEE Symposium on Security and Privacy, page 120, Washington, DC, USA, 1996. IEEE Computer Society.
    • S. Forrest, S. A. Hofmeyr, A. Somayaji, andT. A. Longstaff. A Sense of Self for Unix Processes. In SP '96: Proceedings of the 1996 IEEE Symposium on Security and Privacy, page 120, Washington, DC, USA, 1996. IEEE Computer Society.
  • 8
    • 36349031323 scopus 로고    scopus 로고
    • E. A. O. Levy. Smashing the Stack for Fun and Profit. Phrack Magazine, 0x07, Issue #49, Phile 14 of 16, 1998.
    • E. A. O. Levy. Smashing the Stack for Fun and Profit. Phrack Magazine, Volume 0x07, Issue #49, Phile 14 of 16, 1998.
  • 11
    • 0038011184 scopus 로고    scopus 로고
    • D. Wagner and P. Soto. Mimicry Attacks on Host Based Intrusion Detection Systems. In Proc. Ninth ACM Conference on Computer and Communications Security., 2002.
    • D. Wagner and P. Soto. Mimicry Attacks on Host Based Intrusion Detection Systems. In Proc. Ninth ACM Conference on Computer and Communications Security., 2002.
  • 12
    • 36349028741 scopus 로고    scopus 로고
    • R. N. Wojtczuk. The Advanced return-into-lib(c) Exploits: PaX Case Study. Phrack Magazine, 0x0b, Issue 0x3a, Phile #0x04 of 0x0e, December 2001.
    • R. N. Wojtczuk. The Advanced return-into-lib(c) Exploits: PaX Case Study. Phrack Magazine, Volume 0x0b, Issue 0x3a, Phile #0x04 of 0x0e, December 2001.
  • 13
    • 35048832288 scopus 로고    scopus 로고
    • Context Sensitive Anomaly Monitoring of Process Control Flow to Detect Mimicry Attacks and Impossible Paths
    • H. Xu, W. Du, and S. J. Chapin. Context Sensitive Anomaly Monitoring of Process Control Flow to Detect Mimicry Attacks and Impossible Paths. RAID LNCS 3224 Springer-Verlag, pages 21-38, 2004.
    • (2004) RAID LNCS 3224 Springer-Verlag , pp. 21-38
    • Xu, H.1    Du, W.2    Chapin, S.J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.