메뉴 건너뛰기




Volumn , Issue , 2007, Pages 165-170

Automatic patch generation for buffer overflow attacks

Author keywords

[No Author keywords available]

Indexed keywords

ANALYSIS SYSTEM; APPLICATION PROGRAMS; ATTACK SIGNATURE; AUTOMATICALLY GENERATED; BUFFER OVERFLOW ATTACKS; EXECUTION TRACES; INFORMATION ASSURANCE AND SECURITY (IAS); INTRUSION PREVENTION SYSTEM (IPS); NETWORK SERVICES; NETWORK SERVICES (CO); PROGRAM TRANSFORMATIONS; RUN TIME; SOURCE CODING;

EID: 46749088335     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/IAS.2007.87     Document Type: Conference Paper
Times cited : (31)

References (21)
  • 13
    • 46749148790 scopus 로고    scopus 로고
    • S. Nanda and T-C. Chiueh. Foreign code detection for Windows/X86 binaries. ECSL Technical report TR-190, Computer Science Department, Stony Brook University, 2005.
    • S. Nanda and T-C. Chiueh. Foreign code detection for Windows/X86 binaries. ECSL Technical report TR-190, Computer Science Department, Stony Brook University, 2005.
  • 16
    • 30344459996 scopus 로고    scopus 로고
    • Countering network worms through automatic patch generation
    • S. Sidiroglou and A. D. Keromytis. Countering network worms through automatic patch generation. IEEE Security and Privacy, 3(6), 2005.
    • (2005) IEEE Security and Privacy , vol.3 , Issue.6
    • Sidiroglou, S.1    Keromytis, A.D.2
  • 20
    • 25844462447 scopus 로고    scopus 로고
    • Defending against internet worms: A signature-based approach
    • Y. Tang and S. Chen. Defending against internet worms: a signature-based approach. In Proc. of INFOCOM 2005, 2005.
    • (2005) Proc. of INFOCOM 2005
    • Tang, Y.1    Chen, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.