메뉴 건너뛰기




Volumn , Issue , 2008, Pages 195-204

Execution trace-driven automated attack signature generation

Author keywords

[No Author keywords available]

Indexed keywords

ATTACK SIGNATURES; AUTOMATED ATTACKS; DYNAMIC DATUM; EXECUTION TRACES; NETWORK INTRUSIONS; NETWORK PACKETS; PROCESS NETWORKS; PROTECTED NETWORKS; WEB APPLICATIONS;

EID: 60649099785     PISSN: 10639527     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ACSAC.2008.58     Document Type: Conference Paper
Times cited : (7)

References (40)
  • 3
    • 84868893793 scopus 로고    scopus 로고
    • Php-post. http://scripts.ringsworld.com/discussion-boards/phpp/.
    • Php-post
  • 7
    • 33646767376 scopus 로고    scopus 로고
    • M. Abadi, M. Budiu, Úlfar Erlingsson, and J. Ligatti. Control-flow integrity: Principles, implementations, and applications. In CCS, Nov 2005.
    • M. Abadi, M. Budiu, Úlfar Erlingsson, and J. Ligatti. Control-flow integrity: Principles, implementations, and applications. In CCS, Nov 2005.
  • 8
    • 60649111839 scopus 로고    scopus 로고
    • C. Anley. Advanced sql injection. An NGS Software Insight Security Research (NISR) Publication, June
    • C. Anley. Advanced sql injection. An NGS Software Insight Security Research (NISR) Publication, June.
  • 13
    • 84991997276 scopus 로고    scopus 로고
    • Securing software by enforcing data-flow integrity
    • M. Castro, M. Costa, and T. Harris. Securing software by enforcing data-flow integrity. In OSDI, pages 147-160, 2006.
    • (2006) OSDI , pp. 147-160
    • Castro, M.1    Costa, M.2    Harris, T.3
  • 14
    • 27544450000 scopus 로고    scopus 로고
    • Checking array bound violation using segmentation hardware
    • L. chung Lam. Checking array bound violation using segmentation hardware. In DSN, pages 388-397, 2005.
    • (2005) DSN , pp. 388-397
    • chung Lam, L.1
  • 15
    • 39049160206 scopus 로고    scopus 로고
    • A general dynamic information flow tracking framework for security applications
    • L. chung Lam and T. cker Chiueh. A general dynamic information flow tracking framework for security applications. In ACSAC, 2006.
    • (2006) ACSAC
    • chung Lam, L.1    cker Chiueh, T.2
  • 16
    • 41149160709 scopus 로고    scopus 로고
    • Bouncer: Securing software by blocking bad input
    • M. Costa, M. Castro, L. Zhou, L. Zhang, and M. Peinado. Bouncer: securing software by blocking bad input. In SOSP, pages 117-130, 2007.
    • (2007) SOSP , pp. 117-130
    • Costa, M.1    Castro, M.2    Zhou, L.3    Zhang, L.4    Peinado, M.5
  • 19
    • 33745788387 scopus 로고    scopus 로고
    • On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits
    • J. R. Crandall, Z. Su, S. F. Wu, and F. T. Chong. On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits. In Computer and communications security, pages 235-248, 2005.
    • (2005) Computer and communications security , pp. 235-248
    • Crandall, J.R.1    Su, Z.2    Wu, S.F.3    Chong, F.T.4
  • 20
    • 34548717095 scopus 로고    scopus 로고
    • Shieldgen: Automatic data patch generation for unknown vulnerabilities with informed probing
    • W. Cui, M. Peinado, H. J. Wang, and M. E. Locasto. Shieldgen: Automatic data patch generation for unknown vulnerabilities with informed probing. In IEEE Symposium on Security and Privacy, pages 252-266, 2007.
    • (2007) IEEE Symposium on Security and Privacy , pp. 252-266
    • Cui, W.1    Peinado, M.2    Wang, H.J.3    Locasto, M.E.4
  • 21
    • 31844450371 scopus 로고    scopus 로고
    • Dart: Directed automated random testing
    • June
    • P. Godefroid, N. Klarlund, and K. Sen. Dart: directed automated random testing. In PLDI, pages 213-223, June 2005.
    • (2005) PLDI , pp. 213-223
    • Godefroid, P.1    Klarlund, N.2    Sen, K.3
  • 24
    • 85084163246 scopus 로고    scopus 로고
    • Autograph: Toward automated, distributed worm signature detection
    • H.-A. Kim and B. Karp. Autograph: toward automated, distributed worm signature detection. In USENIX Security Symposium, 2004.
    • (2004) USENIX Security Symposium
    • Kim, H.-A.1    Karp, B.2
  • 26
    • 0024089764 scopus 로고
    • Dynamic program slicing
    • B. Korel and J. Laski. Dynamic program slicing. Inf. Process. Lett., 29(3):155-163, 1988.
    • (1988) Inf. Process. Lett , vol.29 , Issue.3 , pp. 155-163
    • Korel, B.1    Laski, J.2
  • 28
    • 33846294027 scopus 로고    scopus 로고
    • Automatic generation of buffer overflow signatures: An approach based on program behavior models
    • Z. Liang and R. Sekar. Automatic generation of buffer overflow signatures: An approach based on program behavior models. In ACSAC 2005.
    • ACSAC 2005
    • Liang, Z.1    Sekar, R.2
  • 29
    • 33745800070 scopus 로고    scopus 로고
    • Z. Liang and R. Sekar. Fast and automated generation of attack signatures: A basis for building self-protecting servers. In CCS, 2005.
    • Z. Liang and R. Sekar. Fast and automated generation of attack signatures: A basis for building self-protecting servers. In CCS, 2005.
  • 31
    • 83755167276 scopus 로고    scopus 로고
    • Dynamic multi-process information flow tracking for web application security
    • S. Nanda, L. chung Lam, and T. cker Chiueh. Dynamic multi-process information flow tracking for web application security. In Middleware 2007.
    • Middleware 2007
    • Nanda, S.1    chung Lam, L.2    cker Chiueh, T.3
  • 32
    • 27544498978 scopus 로고    scopus 로고
    • Polygraph: Automatically generating signatures for polymorphic worms
    • J. Newsome, B. Karp, and D. Song. Polygraph: Automatically generating signatures for polymorphic worms. In IEEE Symposium on Security and Privacy, pages 226-241, 2005.
    • (2005) IEEE Symposium on Security and Privacy , pp. 226-241
    • Newsome, J.1    Karp, B.2    Song, D.3
  • 34
    • 2642520196 scopus 로고    scopus 로고
    • A binary rewriting defense against stack-based buffer overflow attacks
    • M. Prasad and T. cker Chiueh. A binary rewriting defense against stack-based buffer overflow attacks. In USENIX Annual Technical Conference, pages 211-224, 2003.
    • (2003) USENIX Annual Technical Conference , pp. 211-224
    • Prasad, M.1    cker Chiueh, T.2
  • 35
    • 77954504457 scopus 로고    scopus 로고
    • A practical dynamic buffer overflow detector
    • Feb
    • O. Ruwase and M. Lam. A practical dynamic buffer overflow detector. In NDSS, Feb 2004.
    • (2004) NDSS
    • Ruwase, O.1    Lam, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.