메뉴 건너뛰기




Volumn , Issue , 2007, Pages 85-94

Guarded models for intrusion detection

Author keywords

Dynamic analysis; Intrusion detection; Invariant generation; Static analysis

Indexed keywords

GUARDED MODELS; HOST-BASED INTRUSION DETECTION SYSTEMS; INVARIANT GENERATION;

EID: 36448930873     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1255329.1255345     Document Type: Conference Paper
Times cited : (6)

References (39)
  • 1
    • 84858463487 scopus 로고    scopus 로고
    • Build-Interceptor. Website, 2007. http://freshmeat.net/ projects/build-interceptor/.
    • (2007) Website
    • Build-Interceptor1
  • 2
    • 84858472533 scopus 로고    scopus 로고
    • Elsa. Website, 2007. http://www.cs.berkeley.edu/~smcpeak/ elkhound/sources/elsa/.
    • (2007) Website
    • Elsa1
  • 3
    • 84858462679 scopus 로고    scopus 로고
    • Oink. Website, 2007. http://freshmeat.net/projects/oink/.
    • (2007) Website
    • Oink1
  • 8
    • 0033688092 scopus 로고    scopus 로고
    • A static analyzer for finding dynamic programming errors
    • William R. Bush, Jonathan D. Pincus, and David J. Sielaff. A static analyzer for finding dynamic programming errors. Software Practice and Experience, 30(7):775-802, 2000.
    • (2000) Software Practice and Experience , vol.30 , Issue.7 , pp. 775-802
    • Bush, W.R.1    Pincus, J.D.2    Sielaff, D.J.3
  • 11
    • 36448993763 scopus 로고    scopus 로고
    • Alan DeKok. PScan: A limited problem scanner for C. Website, 2000. http://packages.debian.org/pscan.
    • Alan DeKok. PScan: A limited problem scanner for C. Website, 2000. http://packages.debian.org/pscan.
  • 13
    • 0036147522 scopus 로고    scopus 로고
    • Improving security using extensible lightweight static analysis
    • David Evans and David Larochelle. Improving security using extensible lightweight static analysis. IEEE Software, 19(1), 2002.
    • (2002) IEEE Software , vol.19 , Issue.1
    • Evans, D.1    Larochelle, D.2
  • 19
    • 84858480025 scopus 로고    scopus 로고
    • Type qualifiers for Java
    • Technical report, University of Maryland, August, projects/PL/jqual
    • David Greenfieldboyce and Jeffrey S. Foster. Type qualifiers for Java. Technical report, University of Maryland, August 2007. http://www.cs.umd.edu/ projects/PL/jqual/.
    • (2007)
    • Greenfieldboyce, D.1    Foster, J.S.2
  • 20
    • 84858475927 scopus 로고    scopus 로고
    • Guyer, Emery Berger, and Calvin Lin. Detecting errors with configurable whole-program dataflow analysis
    • Technical report, University of Texas at Austin
    • Samuel Guyer, Emery Berger, and Calvin Lin. Detecting errors with configurable whole-program dataflow analysis. Technical report, University of Texas at Austin, 2002. ftp://ftp.cs.utexas.edu/ pub/emery/papers/detecting- errors.pdf.
    • (2002)
    • Samuel1
  • 24
    • 33751027156 scopus 로고    scopus 로고
    • Pixy: A static analysis tool for detecting web application vulnerabilities (short paper)
    • IEEE Computer Society
    • Nenad Jovanovic, Christopher Krügel, and Engin Kirda. Pixy: A static analysis tool for detecting web application vulnerabilities (short paper). In IEEE Symposium on Security and Privacy (Oakland 2006), pages 258-263. IEEE Computer Society, 2006.
    • (2006) IEEE Symposium on Security and Privacy (Oakland 2006) , pp. 258-263
    • Jovanovic, N.1    Krügel, C.2    Kirda, E.3
  • 25
    • 33745787285 scopus 로고    scopus 로고
    • PhD thesis, University of California, Berkeley
    • Ben Liblit. Cooperative Bug Isolation. PhD thesis, University of California, Berkeley, 2005.
    • (2005) Cooperative Bug Isolation
    • Liblit, B.1
  • 26
    • 84923564816 scopus 로고    scopus 로고
    • Finding security vulnerabilities in Java applications with static analysis
    • V. Livshits and M. Lam. Finding security vulnerabilities in Java applications with static analysis. In Proc. of the 14th USENIXSecurity Symposium, 2005.
    • (2005) Proc. of the 14th USENIXSecurity Symposium
    • Livshits, V.1    Lam, M.2
  • 30
    • 84858454760 scopus 로고    scopus 로고
    • Tim Robbins. Libformat, 2000. http://archives.neohapsis. com/archives/linux/lsap/2000-q3/0444.html.
    • (2000)
  • 33
    • 0012528068 scopus 로고    scopus 로고
    • Libsafe 2.0: Detection of format string vulnerability exploits
    • Technical report, Avaya Labs, February 2001
    • Timothy Tsai and Navjot Singh. Libsafe 2.0: Detection of format string vulnerability exploits. Technical report, Avaya Labs, February 2001. http://pubs.research.avayalabs.com/pdfs/ ALR-2001-018-whpaper.pdf.
    • Tsai, T.1    Singh, N.2
  • 35
    • 36448974988 scopus 로고    scopus 로고
    • Common Vulnerabilities and Exposures. Format string vulnerabilities. Website, 2007. http://www.cve.mitre.org/cgi-bin/ cvekey.cgi?keyword= format+string.
    • Common Vulnerabilities and Exposures. Format string vulnerabilities. Website, 2007. http://www.cve.mitre.org/cgi-bin/ cvekey.cgi?keyword= format+string.
  • 37


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.