메뉴 건너뛰기




Volumn 290, Issue , 2008, Pages 141-156

Combating memory corruption attacks on scada devices

Author keywords

Memory corruption attacks; Modbus protocol; SCADA systems

Indexed keywords

CRYPTOGRAPHY; SCADA SYSTEMS;

EID: 55549084566     PISSN: 15715736     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-0-387-88523-0_11     Document Type: Article
Times cited : (4)

References (44)
  • 1
    • 0006100649 scopus 로고    scopus 로고
    • Smashing the stack for fun and profit
    • Aleph One, Smashing the stack for fun and profit, Phrack, vol. 7(49), 1996.
    • (1996) Phrack , vol.7 , Issue.49
    • One, A.1
  • 2
    • 55549093289 scopus 로고    scopus 로고
    • S. Alexander, Defeating compiler-level buker overflow protection,; login: The USENIX Magazine, 30(3), pp. 59-71, 2005.
    • S. Alexander, Defeating compiler-level buker overflow protection,; login: The USENIX Magazine, vol. 30(3), pp. 59-71, 2005.
  • 3
    • 84860095094 scopus 로고    scopus 로고
    • Once upon a free()
    • Anonymous
    • Anonymous, Once upon a free(), Phrack, vol. 10(57), 2001.
    • (2001) Phrack , vol.10 , Issue.57
  • 5
    • 55549099440 scopus 로고    scopus 로고
    • A. Baratloo, T. Tsai and N. Singh, libsafe: Protecting critical elements of stacks, White Paper, Avaya, Basking Ridge, New Jersey (pubs.research.avayalabs.com/pdfs/ALR-2001-019-whpaper.pdf), 1999.
    • A. Baratloo, T. Tsai and N. Singh, libsafe: Protecting critical elements of stacks, White Paper, Avaya, Basking Ridge, New Jersey (pubs.research.avayalabs.com/pdfs/ALR-2001-019-whpaper.pdf), 1999.
  • 7
    • 55549148287 scopus 로고    scopus 로고
    • A proactive defense line in SCADA systems
    • SCADA protocol obfuscation:, presented at the
    • C. Bellettini and J. Rrushi, SCADA protocol obfuscation: A proactive defense line in SCADA systems, presented at the SCADA Security Scientific Symposium, 2007.
    • (2007) SCADA Security Scientific Symposium
    • Bellettini, C.1    Rrushi, J.2
  • 9
    • 55549136608 scopus 로고    scopus 로고
    • Bulba and Kil3r, Bypassing StackGuard and StackShield, Phrack, 10(56), 2000.
    • Bulba and Kil3r, Bypassing StackGuard and StackShield, Phrack, vol. 10(56), 2000.
  • 10
    • 84902507067 scopus 로고    scopus 로고
    • Formal reasoning of various categories of widely exploited security vulnerabilities by pointer taintedness semantics
    • Y. Deswarte, F. Cuppens, S. Jajodia and L. Wang Eds, Kluwer, Boston, Massachusetts, pp
    • S. Chen, K. Pattabiraman, Z. Kalbarczyk and R. Iyer, Formal reasoning of various categories of widely exploited security vulnerabilities by pointer taintedness semantics, in Security and Protection in Information Processing Systems, Y. Deswarte, F. Cuppens, S. Jajodia and L. Wang (Eds.), Kluwer, Boston, Massachusetts, pp. 83-100, 2004.
    • (2004) Security and Protection in Information Processing Systems , pp. 83-100
    • Chen, S.1    Pattabiraman, K.2    Kalbarczyk, Z.3    Iyer, R.4
  • 13
    • 55549113407 scopus 로고    scopus 로고
    • M. Conover and w00w00 Security Team, w00w00 on heap overflows (www.w00w00.org/lles/articles/heaptut.txt), 1999.
    • M. Conover and w00w00 Security Team, w00w00 on heap overflows (www.w00w00.org/lles/articles/heaptut.txt), 1999.
  • 18
    • 55549106675 scopus 로고    scopus 로고
    • Gera and Riq, Advances in format string exploitation, Phrack, 10(59), 2002.
    • Gera and Riq, Advances in format string exploitation, Phrack, vol. 10(59), 2002.
  • 19
    • 55549098020 scopus 로고    scopus 로고
    • iDefense Labs, LiveData Protocol Server heap overflow vulnerability, Sterling, Virginia (labs.idefense.com/intelligence/vulnerabilities/ display.php?id=523), 2007.
    • iDefense Labs, LiveData Protocol Server heap overflow vulnerability, Sterling, Virginia (labs.idefense.com/intelligence/vulnerabilities/ display.php?id=523), 2007.
  • 20
    • 55549103210 scopus 로고    scopus 로고
    • International Electrotechnical Commission, Telecontrol Equipment and Systems - Part 6-503: Telecontrol Protocols Compatible with ISO Standards and ITU-T Recommendations - TASE.2 Services and Protocol, IEC Publication 60870-6-503, Geneva, Switzerland, 2002.
    • International Electrotechnical Commission, Telecontrol Equipment and Systems - Part 6-503: Telecontrol Protocols Compatible with ISO Standards and ITU-T Recommendations - TASE.2 Services and Protocol, IEC Publication 60870-6-503, Geneva, Switzerland, 2002.
  • 22
    • 14844307465 scopus 로고    scopus 로고
    • Vudo malloc tricks
    • M. Kaempf, Vudo malloc tricks, Phrack, vol. 11(57), 2001.
    • (2001) Phrack , vol.11 , Issue.57
    • Kaempf, M.1
  • 24
    • 3042541202 scopus 로고    scopus 로고
    • Frame pointer overwriting
    • Klog, Frame pointer overwriting, Phrack, vol. 9(55), 1999.
    • (1999) Phrack , vol.9 , Issue.55
    • Klog1
  • 27
    • 55549100468 scopus 로고    scopus 로고
    • L. Mora, OPC exposed: Part I, presented at the SCADA Security Scientific Symposium, 2007.
    • L. Mora, OPC exposed: Part I, presented at the SCADA Security Scientific Symposium, 2007.
  • 28
    • 3042642332 scopus 로고    scopus 로고
    • Advanced return-into-lib(c) exploits: PaX case study
    • Nergal, Advanced return-into-lib(c) exploits: PaX case study, Phrack vol. 10(58), 2001.
    • (2001) Phrack , vol.10 , Issue.58
    • Nergal1
  • 30
    • 84898272718 scopus 로고    scopus 로고
    • Format string technique
    • bc/ NN-formats.txt
    • NOP Ninjas, Format string technique (julianor.tripod.com/bc/ NN-formats.txt), 2001.
    • (2001)
    • Ninjas, N.O.P.1
  • 31
    • 55549134858 scopus 로고    scopus 로고
    • From source to binary: The inner workings of GCC
    • December
    • D. Novillo, From source to binary: The inner workings of GCC, Red Hat Magazine (www.redhat.com/magazine/002dec04/features/gcc), December 2004.
    • (2004) Red Hat Magazine
    • Novillo, D.1
  • 33
    • 55549110632 scopus 로고    scopus 로고
    • Documentation for the PaX Project
    • PaX-Team, pax.grsecurity.net/docs
    • PaX-Team, Documentation for the PaX Project (pax.grsecurity.net/docs), 2008.
    • (2008)
  • 38
    • 84902123731 scopus 로고    scopus 로고
    • Securing control systems with multilayer static mutation
    • presented at the
    • S. Simmons, D. Edwards and N. Wilde, Securing control systems with multilayer static mutation, presented at the Process Control Systems Forum Annual Meeting (www.pcsforum.org/events/2007/atlanta/documents/ west.pdf), 2007.
    • (2007) Process Control Systems Forum Annual Meeting
    • Simmons, S.1    Edwards, D.2    Wilde, N.3
  • 41
    • 55549121078 scopus 로고    scopus 로고
    • Washington, DC
    • US-CERT, LiveData ICCP Server heap buker overflow vulnerability, Vulnerability Note VU#190617
    • US-CERT, LiveData ICCP Server heap buker overflow vulnerability, Vulnerability Note VU#190617, Washington, DC (www.kb.cert.org/vuls/id/ 190617), 2006.
    • (2006)
  • 42
    • 55549133470 scopus 로고    scopus 로고
    • US-CERT, Takebishi Electric DeviceXPlorer OPC Server fails to properly validate OPC server handles, Vulnerability note VU#926551, Washington, DC (www.kb.cert.org/vuls/id/926551), 2007.
    • US-CERT, Takebishi Electric DeviceXPlorer OPC Server fails to properly validate OPC server handles, Vulnerability note VU#926551, Washington, DC (www.kb.cert.org/vuls/id/926551), 2007.
  • 44
    • 55549133134 scopus 로고    scopus 로고
    • C. Walter, FreeMODBUS: A Modbus ASCII/RTU and TCP implementation (v1.3), FreeMODBUS, Vienna, Austria (freemodbus.berlios.de), 2007.
    • C. Walter, FreeMODBUS: A Modbus ASCII/RTU and TCP implementation (v1.3), FreeMODBUS, Vienna, Austria (freemodbus.berlios.de), 2007.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.