메뉴 건너뛰기




Volumn , Issue , 2009, Pages 33-46

Orchestra: Intrusion detection using parallel Execution and monitoring of program variants in user-space

Author keywords

Intrusion detection; Multi core processors; Multi variant execution; Process monitoring; Vulnerability

Indexed keywords

CORE SYSTEMS; EXECUTION ENVIRONMENTS; KERNEL MODIFICATIONS; MULTI-CORE PROCESSORS; MULTI-CORE SYSTEMS; MULTI-VARIANT EXECUTION; PARALLEL EXECUTIONS; SYNCHRONIZATION POINTS; VULNERABILITY;

EID: 70349127596     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1519065.1519071     Document Type: Conference Paper
Times cited : (106)

References (45)
  • 1
    • 0006100649 scopus 로고    scopus 로고
    • Smashing the stack for fun and profit
    • Aleph One. Smashing the stack for fun and profit. Phrack, 7(2), 1996.
    • (1996) Phrack , vol.7 , Issue.2
    • One, A.1
  • 2
    • 70349154324 scopus 로고    scopus 로고
    • Apache Software Foundation. ab-Apache HTTP Server Benchmarking Tool.
    • Apache Software Foundation. ab-Apache HTTP Server Benchmarking Tool.
  • 4
    • 0017792448 scopus 로고    scopus 로고
    • A. Avizienis and L. Chen. On the implementation of n-version programming for software fault tolerance during execution. In IEEE International Computer Software and Applications Conference COMPSAC, 77, pages 149-155, 1977
    • A. Avizienis and L. Chen. On the implementation of n-version programming for software fault tolerance during execution. In IEEE International Computer Software and Applications Conference (COMPSAC), volume 77, pages 149-155, 1977.
  • 7
    • 84862209017 scopus 로고    scopus 로고
    • Address obfuscation: An efficient approach to combat a broad range of memory error exploits
    • S. Bhatkar, D. C. DuVarney, and R. Sekar. Address obfuscation: An efficient approach to combat a broad range of memory error exploits. In Proceedings of the 12th USENIX Security Symposium, pages 105-120, 2003.
    • (2003) Proceedings of the 12th USENIX Security Symposium , pp. 105-120
    • Bhatkar, S.1    DuVarney, D.C.2    Sekar, R.3
  • 9
    • 14944374640 scopus 로고    scopus 로고
    • Mitigating buffer overflows by operating system randomization
    • Technical report, Department of Computer Science, Carnegie Mellon University
    • M. Chew and D. Song. Mitigating buffer overflows by operating system randomization. Technical report, Department of Computer Science, Carnegie Mellon University, 2002.
    • (2002)
    • Chew, M.1    Song, D.2
  • 10
    • 0027684663 scopus 로고
    • Operating system protection through program evolution
    • October
    • F. Cohen. Operating system protection through program evolution. Computers and Security, 12(6):565-584, October 1993.
    • (1993) Computers and Security , vol.12 , Issue.6 , pp. 565-584
    • Cohen, F.1
  • 13
    • 70349134819 scopus 로고    scopus 로고
    • URL
    • Diet libc. URL http://www.fefe.de/dietlibc/.
    • Diet libc
  • 18
    • 84899595286 scopus 로고    scopus 로고
    • GNU. GNU Compiler, GCC, URL
    • GNU. GNU Compiler Collection (GCC). URL http://gcc.gnu.org.
    • Collection
  • 20
    • 0043199887 scopus 로고    scopus 로고
    • Characteristics of I/O traffic in personal computer and server workloads
    • W. Hsu and A.J. Smith. Characteristics of I/O traffic in personal computer and server workloads. IBM Systems Journal, 2003.
    • (2003) IBM Systems Journal
    • Hsu, W.1    Smith, A.J.2
  • 21
    • 70349145920 scopus 로고    scopus 로고
    • Intel. Paul Otellini Keynote. Intel Developer Forum, September 2006.
    • Intel. Paul Otellini Keynote. Intel Developer Forum, September 2006.
  • 26
    • 70349106066 scopus 로고    scopus 로고
    • A. Manion and J. Gennari. US-CERT Vulnerability Note VU#175500, October 2005. URL http://www.kb. cert.org/vuls/id/17550 0.
    • A. Manion and J. Gennari. US-CERT Vulnerability Note VU#175500, October 2005. URL http://www.kb. cert.org/vuls/id/17550 0.
  • 31
    • 3042642332 scopus 로고    scopus 로고
    • The advanced return-into-lib(c) exploits: PaX case study
    • Nergal. The advanced return-into-lib(c) exploits: PaX case study. Phrack, 2001.
    • (2001) Phrack
    • Nergal1
  • 35
    • 70349141060 scopus 로고    scopus 로고
    • URL http://pax. grsecurity.net
    • PaX. URL http://pax. grsecurity.net.
  • 36
    • 4344593013 scopus 로고    scopus 로고
    • Beyond stack smashing: Recent advances in exploiting buffer overruns
    • J. Pincus and B. Baker. Beyond stack smashing: Recent advances in exploiting buffer overruns. IEEE Security and Privacy, pages 20-27, 2004.
    • (2004) IEEE Security and Privacy , pp. 20-27
    • Pincus, J.1    Baker, B.2
  • 39
    • 70349124701 scopus 로고    scopus 로고
    • rd. THCsnortbo 0.3 - Snort BackOrifice PING exploit, October 2005. URL http://milwOrm.com/exploits/1272.
    • rd. THCsnortbo 0.3 - Snort BackOrifice PING exploit, October 2005. URL http://milwOrm.com/exploits/1272.
  • 43
    • 70349123861 scopus 로고    scopus 로고
    • Standard Performance Evaluation Corporation SPEC, URL
    • Standard Performance Evaluation Corporation (SPEC). URL http://www.spec.org.
  • 44
    • 70349090700 scopus 로고    scopus 로고
    • C. Taschner and A. Manion. US-CERT Vulnerability Note VU#196240, February 2007. URL http://www. kb.cert.org/vuls/id/19 62 4 0.
    • C. Taschner and A. Manion. US-CERT Vulnerability Note VU#196240, February 2007. URL http://www. kb.cert.org/vuls/id/19 62 4 0.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.