메뉴 건너뛰기




Volumn , Issue , 2007, Pages 487-500

The age of data: Pinpointing guilty bytes in polymorphic buffer overflows on heap or stack

Author keywords

Attack analysis; Honeypots; Intrusion detection and prevention

Indexed keywords

BUFFER STORAGE; SECURITY OF DATA; SECURITY SYSTEMS;

EID: 48649093823     PISSN: 10639527     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ACSAC.2007.32     Document Type: Conference Paper
Times cited : (16)

References (35)
  • 2
    • 84861271517 scopus 로고    scopus 로고
    • Anonymous
    • Anonymous. Once upon a free(). http://doc.bughunter.net/ buffer-overflow/free.html.
    • Once upon a free()
  • 3
    • 85038810709 scopus 로고    scopus 로고
    • Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks
    • W. X. S. Bhatkar and R. Sekar. Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks. In Proceedings of 15th USENIX Security Symposium, 2006.
    • (2006) Proceedings of 15th USENIX Security Symposium
    • Bhatkar, W.X.S.1    Sekar, R.2
  • 5
    • 48649083443 scopus 로고    scopus 로고
    • R. Chinchani and E. Berg. fast static analysis approach to detect exploit code inside network flows. In In Recent Advances in Intrusion Detection, Seattle, WA, 2005.
    • R. Chinchani and E. Berg. fast static analysis approach to detect exploit code inside network flows. In In Recent Advances in Intrusion Detection, Seattle, WA, 2005.
  • 11
    • 34547359214 scopus 로고    scopus 로고
    • Evading network anomaly detection systems: Formal reasoning and practical techniques
    • P. Fogla and W. Lee. Evading network anomaly detection systems: formal reasoning and practical techniques. In Proceedings of the 13th ACM CCS, 2006.
    • (2006) Proceedings of the 13th ACM CCS
    • Fogla, P.1    Lee, W.2
  • 12
    • 33750298577 scopus 로고    scopus 로고
    • Automated discovery of mimicry attacks
    • D. Zamboni and C. Krügel, editors, RAID, of, Springer
    • J. T. Giffin, S. Jha, and B. P. Miller. Automated discovery of mimicry attacks. In D. Zamboni and C. Krügel, editors, RAID, volume 4219 of Lecture Notes in Computer Science. Springer, 2006.
    • (2006) Lecture Notes in Computer Science , vol.4219
    • Giffin, J.T.1    Jha, S.2    Miller, B.P.3
  • 14
    • 33746389292 scopus 로고    scopus 로고
    • Polymorphic worm detection using structural information of executables
    • Seattle, WA, October
    • C. Krügel, E. Kirda, D. Mutz, W. Robertson, and G. Vigna. Polymorphic worm detection using structural information of executables. In RAID, Seattle, WA, October 2005.
    • (2005) RAID
    • Krügel, C.1    Kirda, E.2    Mutz, D.3    Robertson, W.4    Vigna, G.5
  • 21
    • 79953672829 scopus 로고    scopus 로고
    • Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
    • J. Newsome and D. X. Song. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In Proceedings of the NDSS, 2005.
    • (2005) Proceedings of the NDSS
    • Newsome, J.1    Song, D.X.2
  • 22
    • 48649106120 scopus 로고    scopus 로고
    • Open Source Vulnerability Database. Subversion date parsing overflow. http://osvdb.org/displayvuln.php?osvdbid=6301, 2004.
    • Open Source Vulnerability Database. Subversion date parsing overflow. http://osvdb.org/displayvuln.php?osvdbid=6301, 2004.
  • 24
  • 32
    • 21844456680 scopus 로고    scopus 로고
    • Shield: Vulnerability-driven network filters for preventing known vulnerability exploits
    • H. J. Wang, C. Guo, D. R. Simon, and A. Zugenmaier. Shield: vulnerability-driven network filters for preventing known vulnerability exploits. SIGCOMM Comput. Commun. Rev., 34(4):193-204, 2004.
    • (2004) SIGCOMM Comput. Commun. Rev , vol.34 , Issue.4 , pp. 193-204
    • Wang, H.J.1    Guo, C.2    Simon, D.R.3    Zugenmaier, A.4
  • 35
    • 85027555608 scopus 로고    scopus 로고
    • X.Wang, C.-C. Pan, P. Liu, and S. Zh. Sigfree: A signature-free buffer overflow attack blocker. In Proceedings of 15th USENIX Security Symposium, 2006.
    • X.Wang, C.-C. Pan, P. Liu, and S. Zh. Sigfree: A signature-free buffer overflow attack blocker. In Proceedings of 15th USENIX Security Symposium, 2006.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.