메뉴 건너뛰기




Volumn , Issue , 2008, Pages 287-299

Eudaemon: Involuntary and on-demand emulation against zero-day exploits

Author keywords

Honeypots; Operating systems; Security

Indexed keywords

CONTROL FLOWS; END USERS; FLEXIBLE MECHANISMS; HONEYPOT; HONEYPOTS; HYPERVISOR; INTRUSION DETECTION AND PREVENTIONS; MALICIOUS CODES; ON DEMANDS; OPERATING SYSTEM SUPPORTS; OPERATING SYSTEMS; PERFORMANCE PENALTIES; RUNNING PROCESS; RUNNING SYSTEMS; SECURITY; SOURCE CODES; VULNERABLE REGIONS;

EID: 59249104752     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1352592.1352622     Document Type: Conference Paper
Times cited : (12)

References (39)
  • 4
    • 34748845128 scopus 로고    scopus 로고
    • Practical taint-based protection using demand emulation
    • Leuven, Belgium, April
    • A. Ho, M. Fetterman, C. Clark, A. Warfield, and S. Hand. Practical taint-based protection using demand emulation. In EuroSys, Leuven, Belgium, April 2006.
    • (2006) EuroSys
    • Ho, A.1    Fetterman, M.2    Clark, C.3    Warfield, A.4    Hand, S.5
  • 6
    • 85063636742 scopus 로고    scopus 로고
    • QEMU, a fast and portable dynamic translator
    • Anaheim, CA, April
    • F. Bellard. QEMU, a fast and portable dynamic translator. In Proc. of USENIX ATC, pages 41-46, Anaheim, CA, April 2005.
    • (2005) Proc. of USENIX ATC , pp. 41-46
    • Bellard, F.1
  • 8
    • 84862209017 scopus 로고    scopus 로고
    • Address obfuscation: An efficient approach to combat a broad range of memory error exploits
    • August
    • S. Bhatkar, D. D. Varney, and R. Sekar. Address obfuscation: an efficient approach to combat a broad range of memory error exploits. In Proc. of USENIX Security, pages 105-120, August 2003.
    • (2003) Proc. of USENIX Security , pp. 105-120
    • Bhatkar, S.1    Varney, D.D.2    Sekar, R.3
  • 9
    • 33751056900 scopus 로고    scopus 로고
    • Towards automatic generation of vulnerability-based signatures
    • Oakland, CA, May
    • D. Brumley, J. Newsome, D. Song, H. Wang, and S. Jha. Towards automatic generation of vulnerability-based signatures. In Security and Privacy, Oakland, CA, May 2006.
    • (2006) Security and Privacy
    • Brumley, D.1    Newsome, J.2    Song, D.3    Wang, H.4    Jha, S.5
  • 10
    • 85009448253 scopus 로고    scopus 로고
    • C. Cowan, S. Beattie, J. Johansen and P. Wagle. PointGuard: Protecting pointers from buffer overflow vulnerabilities. In In Proc. of the 12th USENIX Security Symposium, pages 91-104, August 2003.
    • C. Cowan, S. Beattie, J. Johansen and P. Wagle. PointGuard: Protecting pointers from buffer overflow vulnerabilities. In In Proc. of the 12th USENIX Security Symposium, pages 91-104, August 2003.
  • 15
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • D. Denning. A lattice model of secure information flow. ACM Transactions on Communications, 19(5):236-243, 1976.
    • (1976) ACM Transactions on Communications , vol.19 , Issue.5 , pp. 236-243
    • Denning, D.1
  • 16
    • 59249103779 scopus 로고    scopus 로고
    • eEye. eeye industry newsletter. http://www.eeye.com/html/resources/ newsletters/versa/VE20070516.html#techtal%k, May 2007.
    • eEye. eeye industry newsletter. http://www.eeye.com/html/resources/ newsletters/versa/VE20070516.html#techtal%k, May 2007.
  • 17
    • 0043199887 scopus 로고    scopus 로고
    • Characteristics of i/o traffic in personal computer and server workloads
    • W. W. Hsu and A. J. Smith. Characteristics of i/o traffic in personal computer and server workloads. IBM Systems Journal, 42(2), 2003.
    • (2003) IBM Systems Journal , vol.42 , Issue.2
    • Hsu, W.W.1    Smith, A.J.2
  • 19
    • 2342615538 scopus 로고    scopus 로고
    • Anti-honeypot technology
    • January
    • N. Krawetz. Anti-honeypot technology. IEEE Security and Privacy, 2(1):76-79, January 2004.
    • (2004) IEEE Security and Privacy , vol.2 , Issue.1 , pp. 76-79
    • Krawetz, N.1
  • 20
    • 59249091564 scopus 로고    scopus 로고
    • Accountability and freedom
    • Cambridge, UK, October
    • B. Lampson. Accountability and freedom. In Cambridge Computer Seminar, Cambridge, UK, October 2005.
    • (2005) Cambridge Computer Seminar
    • Lampson, B.1
  • 21
    • 33750320499 scopus 로고    scopus 로고
    • Automatic handling of protocol dependencies and reaction to 0-day attacks with scriptgen based honeypots
    • Hamburg, Germany, September
    • C. Leita, M. Dacier, and F. Massicotte. Automatic handling of protocol dependencies and reaction to 0-day attacks with scriptgen based honeypots. In Proceedings of RAID'06, pages 185-205, Hamburg, Germany, September 2006.
    • (2006) Proceedings of RAID'06 , pp. 185-205
    • Leita, C.1    Dacier, M.2    Massicotte, F.3
  • 29
    • 59249084067 scopus 로고    scopus 로고
    • Load your 32-bit dll into another process's address space using injlib
    • January
    • J. Richter. Load your 32-bit dll into another process's address space using injlib. Microsoft Systems Journal (MSJ), January 1996.
    • (1996) Microsoft Systems Journal (MSJ)
    • Richter, J.1
  • 33
    • 48649093823 scopus 로고    scopus 로고
    • The age of data: Pinpointing guilty bytes in polymorphic buffer overflows on heap or stack
    • Miami, FLA, December
    • A. Slowinska and H. Bos. The age of data: pinpointing guilty bytes in polymorphic buffer overflows on heap or stack. In 23rd Annual Computer Security Applications Conference (ACSAC'07), Miami, FLA, December 2007.
    • (2007) 23rd Annual Computer Security Applications Conference (ACSAC'07)
    • Slowinska, A.1    Bos, H.2
  • 34
    • 59249098978 scopus 로고    scopus 로고
    • P. Szor and P. Ferrie. Hunting for metamorphic. In Virus Bulletin Conference, pages 123-144, Abingdon, Oxfordshire, England, September 2001.
    • P. Szor and P. Ferrie. Hunting for metamorphic. In Virus Bulletin Conference, pages 123-144, Abingdon, Oxfordshire, England, September 2001.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.