메뉴 건너뛰기




Volumn , Issue , 2004, Pages 235-248

Buttercup: On network-based detection of polymorphic buffer overflow vulnerabilities

Author keywords

Buffer Overflow; Network Intrusion Detection System; Polymorphic Shellcode; Snort

Indexed keywords

BUFFER OVERFLOW; NETWORK INTRUSION DETECTION SYSTEM; POLYMORPHIC SHELLCODE; SNORT;

EID: 4544239482     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (47)

References (18)
  • 4
    • 33845888333 scopus 로고    scopus 로고
    • Aleph one. Smashing the stack for fun and profit
    • Aleph One. Smashing the Stack for fun and profit. Phrack Magazine, 49(14), 1996.
    • (1996) Phrack Magazine , vol.49 , Issue.14
  • 9
    • 84862422420 scopus 로고    scopus 로고
    • "ADMuate Readme", http://www.ktwo.ca/readme.html
    • ADMuate Readme
  • 11
    • 84862434861 scopus 로고    scopus 로고
    • http://wwwcsif.cs.ucdavis.edu/~pasupula/Buttercup-paper.doc
  • 16
    • 84958963167 scopus 로고    scopus 로고
    • Accurate buffer overflow detection via abstract payload execution
    • RAID 2002
    • T. Toth, C. Kruegel. Accurate Buffer Overflow Detection via Abstract Payload Execution. RAID 2002, LNCS 2516, pp. 274-291, 2002.
    • (2002) LNCS , vol.2516 , pp. 274-291
    • Toth, T.1    Kruegel, C.2
  • 17
    • 84862424834 scopus 로고    scopus 로고
    • Polymorphic shellcodes vs. application IDSs
    • "Polymorphic Shellcodes vs. Application IDSs", NGSEC White Paper, http://www.ngsec.com
    • NGSEC White Paper
  • 18
    • 27244456440 scopus 로고    scopus 로고
    • Blended attacks exploits, vulnerabilities and buffer-overflow techniques in computer viruses
    • E. Chien, P. Szor. Blended Attacks Exploits, Vulnerabilities and Buffer-Overflow Techniques in Computer Viruses. Virus Bulletin Conference 2002.
    • Virus Bulletin Conference 2002
    • Chien, E.1    Szor, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.