메뉴 건너뛰기




Volumn , Issue , 2008, Pages 245-255

Towards automatic reverse engineering of software security configurations

Author keywords

Access control; Configuration; Context free language; Reserse engineering; Taint analysis

Indexed keywords

ACCESS CONTROL POLICIES; CONFIGURATION; CONFIGURATION FILES; CONTROL CONFIGURATION; GRAPHIC USER INTERFACE; MISCONFIGURATIONS; PARSER GENERATORS; REAL APPLICATIONS; RESERSE ENGINEERING; SECURITY POLICY; SEMANTIC RELATIONS; SOFTWARE SECURITY; TAINT ANALYSIS;

EID: 70349276979     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1455770.1455802     Document Type: Conference Paper
Times cited : (14)

References (33)
  • 1
    • 70349298079 scopus 로고    scopus 로고
    • flex: The Fast Lexical Analyzer. http://flex.sourceforge.net/, as of 2008.
    • flex: The Fast Lexical Analyzer. http://flex.sourceforge.net/, as of 2008.
  • 2
    • 70349296542 scopus 로고    scopus 로고
    • bftpd. http://freshmeat.net/projects/bftpd/, as of April, 2008.
    • bftpd. http://freshmeat.net/projects/bftpd/, as of April, 2008.
  • 3
    • 70349288863 scopus 로고    scopus 로고
    • Microsoft baseline security analyzer, http://www.microsoft.com/technet/ security/tools/MBSAHome.mspx,as of April, 2008.
    • Microsoft baseline security analyzer, http://www.microsoft.com/technet/ security/tools/MBSAHome.mspx,as of April, 2008.
  • 5
    • 33751056900 scopus 로고    scopus 로고
    • D. Brumley, J. Newsome, D. X. Song, H. Wang, and S. Jha. Towards automatic generation of vulnerability-based signatures. In S&P, pages 2-16, 2006.
    • D. Brumley, J. Newsome, D. X. Song, H. Wang, and S. Jha. Towards automatic generation of vulnerability-based signatures. In S&P, pages 2-16, 2006.
  • 6
    • 0029311990 scopus 로고
    • Cfengine: A site configuration engine
    • Summer
    • M. Burgess. Cfengine: A site configuration engine. USENIX Computing systems, 8(3):309-337, Summer 1995.
    • (1995) USENIX Computing systems , vol.8 , Issue.3 , pp. 309-337
    • Burgess, M.1
  • 8
    • 34547335786 scopus 로고    scopus 로고
    • Tainttrace: Efficient flow tracing with dynamic binary rewriting
    • W. Cheng, Q. Zhao, B. Yu, and S. Hiroshige. Tainttrace: Efficient flow tracing with dynamic binary rewriting. In ISCC, pages 749-754, 2006.
    • (2006) ISCC , pp. 749-754
    • Cheng, W.1    Zhao, Q.2    Yu, B.3    Hiroshige, S.4
  • 12
    • 70349294946 scopus 로고    scopus 로고
    • Bison: The Yacc-Compatible Parser Generator
    • Bloomington, Indiana
    • C. Donnelly and R. Stallman. Bison: The Yacc-Compatible Parser Generator. Luniverse Inc, Bloomington, Indiana, 2000.
    • (2000) Luniverse Inc
    • Donnelly, C.1    Stallman, R.2
  • 14
    • 0016971687 scopus 로고
    • Symbolic execution and program testing
    • J. C. King. Symbolic execution and program testing. Commun. ACM, 19(7):385-394, 1976.
    • (1976) Commun. ACM , vol.19 , Issue.7 , pp. 385-394
    • King, J.C.1
  • 16
    • 84976651458 scopus 로고
    • A fast algorithm for finding dominators in aflowgraph
    • T. Lengauer and R. E. Tarjan. A fast algorithm for finding dominators in aflowgraph. ACM Trans. Program. Lang. Syst., 1(1): 121-141, 1979.
    • (1979) ACM Trans. Program. Lang. Syst , vol.1 , Issue.1 , pp. 121-141
    • Lengauer, T.1    Tarjan, R.E.2
  • 17
    • 74049090626 scopus 로고    scopus 로고
    • Automatic protocol format reverse engineering through context-aware monitored execution
    • Z. Lin, X. Jiang, D. Xu, and X. Zhang. Automatic protocol format reverse engineering through context-aware monitored execution. In NDSS, 2008.
    • (2008) NDSS
    • Lin, Z.1    Jiang, X.2    Xu, D.3    Zhang, X.4
  • 22
    • 79953672829 scopus 로고    scopus 로고
    • Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
    • J. Newsome and D. X. Song. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In NDSS, 2005.
    • (2005) NDSS
    • Newsome, J.1    Song, D.X.2
  • 24
    • 40349087553 scopus 로고    scopus 로고
    • A low-overhead practical information flow tracking system for detecting security attacks
    • F. Qin, C. Wang, Z. Li, H.-S. Kim, Y. Zhou, and Y Wu. Lift: A low-overhead practical information flow tracking system for detecting security attacks. In MICRO, pages 135-148, 2006.
    • (2006) MICRO , pp. 135-148
    • Qin, F.1    Wang, C.2    Li, Z.3    Kim, H.-S.4    Zhou, Y.5    Lift, Y.W.6
  • 27
    • 85077048913 scopus 로고    scopus 로고
    • Automatic misconfiguration troubleshooting with peerpressure
    • H. J. Wang, J. C. Platt, Y. Chen, R. Zhang, and Y.-M. Wang. Automatic misconfiguration troubleshooting with peerpressure. In OSDI, pages 245-258, 2004.
    • (2004) OSDI , pp. 245-258
    • Wang, H.J.1    Platt, J.C.2    Chen, Y.3    Zhang, R.4    Wang, Y.-M.5
  • 28
    • 70349299600 scopus 로고    scopus 로고
    • Towards automatics reverse engineering of software security configurations
    • Technical Report IUCS-TR667, Indiana University
    • R. Wang, X. Wang, K. Zhang, and Z. Li. Towards automatics reverse engineering of software security configurations. Technical Report IUCS-TR667, Indiana University, 2008.
    • (2008)
    • Wang, R.1    Wang, X.2    Zhang, K.3    Li, Z.4
  • 29
    • 77952114571 scopus 로고    scopus 로고
    • Strider: A black-box, state-based approach to change and configuration management and support
    • Y.-M. Wang, C. Verbowski, J. Dunagan, Y. Chen, H. J. Wang, C. Yuan, and Z. Zhang. Strider: A black-box, state-based approach to change and configuration management and support. In LISA, pages 159-172, 2003.
    • (2003) LISA , pp. 159-172
    • Wang, Y.-M.1    Verbowski, C.2    Dunagan, J.3    Chen, Y.4    Wang, H.J.5    Yuan, C.6    Zhang, Z.7


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.