메뉴 건너뛰기




Volumn 5587 LNCS, Issue , 2009, Pages 127-146

On the effectiveness of software diversity: A systematic study on real-world vulnerabilities

Author keywords

[No Author keywords available]

Indexed keywords

APPLICATION SOFTWARES; MULTIPLE OPERATING SYSTEMS; OPERATING SYSTEMS; REAL-WORLD; REPLICATED SYSTEMS; SOFTWARE DIVERSITY; SOFTWARE PRODUCTS; SYSTEMATIC STUDY;

EID: 70350655246     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-02918-9_8     Document Type: Conference Paper
Times cited : (18)

References (25)
  • 4
    • 84886393009 scopus 로고    scopus 로고
    • Cox, B., Evans, D., Filipi, A., Rowanhill, J., Hu, W., Davidson, J., Knight, J., Nguyen-Tuong, A., Hiser, J.: N-variant systems - A secretless framework for security through diversity. In: Proceedings of the 15th USENIX Security Symposium (August 2006)
    • Cox, B., Evans, D., Filipi, A., Rowanhill, J., Hu, W., Davidson, J., Knight, J., Nguyen-Tuong, A., Hiser, J.: N-variant systems - A secretless framework for security through diversity. In: Proceedings of the 15th USENIX Security Symposium (August 2006)
  • 5
    • 70350690982 scopus 로고    scopus 로고
    • Dhamankar, R.: SANS Top-20 Security Risks (2007), http://www.sans.org/ top20/2007/
    • Dhamankar, R.: SANS Top-20 Security Risks (2007), http://www.sans.org/ top20/2007/
  • 7
    • 70350670140 scopus 로고    scopus 로고
    • Fyodor, G.L.: Remote os detection via tcp/ip stack fingerprinting. Technical report, INSECURE.ORG (October 1998)
    • Fyodor, G.L.: Remote os detection via tcp/ip stack fingerprinting. Technical report, INSECURE.ORG (October 1998)
  • 8
    • 33745665056 scopus 로고    scopus 로고
    • Gao, D., Reiter, M.K., Song, D.: Behavioral distance for intrusion detection. In: Valdes, A., Zamboni, D. (eds.) RAID 2005. LNCS, 3858, pp. 63-81. Springer, Heidelberg (2006)
    • Gao, D., Reiter, M.K., Song, D.: Behavioral distance for intrusion detection. In: Valdes, A., Zamboni, D. (eds.) RAID 2005. LNCS, vol. 3858, pp. 63-81. Springer, Heidelberg (2006)
  • 9
    • 33750379862 scopus 로고    scopus 로고
    • Gao, D., Reiter, M.K., Song, D.: Behavioral distance measurement using hidden markov models. In: Zamboni, D., Krügel, C. (eds.) RAID 2006. LNCS, 4219, pp. 19-40. Springer, Heidelberg (2006)
    • Gao, D., Reiter, M.K., Song, D.: Behavioral distance measurement using hidden markov models. In: Zamboni, D., Krügel, C. (eds.) RAID 2006. LNCS, vol. 4219, pp. 19-40. Springer, Heidelberg (2006)
  • 10
    • 70350667357 scopus 로고    scopus 로고
    • Gao, D., Reiter, M.K., Song, D.: Beyond output voting: Detecting compromised replicas using HMM-based behavioral distance. IEEE Transactions on Dependable and Secure Computing (TDSC) (July 2008)
    • Gao, D., Reiter, M.K., Song, D.: Beyond output voting: Detecting compromised replicas using HMM-based behavioral distance. IEEE Transactions on Dependable and Secure Computing (TDSC) (July 2008)
  • 11
    • 36248952641 scopus 로고    scopus 로고
    • Fault tolerance via diversity for off-the-shelf products: A study with sql database servers
    • Member-Lorenzo Strigini
    • Gashi, I., Popov, P.: Fault tolerance via diversity for off-the-shelf products: A study with sql database servers. IEEE Transactions on Dependable Secure Computing 4(4), 280-294 (2007); Member-Lorenzo Strigini
    • (2007) IEEE Transactions on Dependable Secure Computing , vol.4 , Issue.4 , pp. 280-294
    • Gashi, I.1    Popov, P.2
  • 12
    • 70350694715 scopus 로고    scopus 로고
    • Geer, D., Bace, R., Gutmann, P., Metzger, P., Pfleeger, C.P., Quarterman, J.S., Schneier, B.: Cyberinsecurity: The cost of monopoly. Technical report, CCIA (2003)
    • Geer, D., Bace, R., Gutmann, P., Metzger, P., Pfleeger, C.P., Quarterman, J.S., Schneier, B.: Cyberinsecurity: The cost of monopoly. Technical report, CCIA (2003)
  • 14
    • 84958977234 scopus 로고    scopus 로고
    • Just, J.E., Reynolds, J.C., Clough, L.A., Danforth, M., Levitt, K.N., Maglich, R., Rowe, J.: Learning unknown attacks - A start. In: Wespi, A., Vigna, G., Deri, L. (eds.) RAID 2002. LNCS, 2516, pp. 158-176. Springer, Heidelberg (2002)
    • Just, J.E., Reynolds, J.C., Clough, L.A., Danforth, M., Levitt, K.N., Maglich, R., Rowe, J.: Learning unknown attacks - A start. In: Wespi, A., Vigna, G., Deri, L. (eds.) RAID 2002. LNCS, vol. 2516, pp. 158-176. Springer, Heidelberg (2002)
  • 16
    • 0032740068 scopus 로고    scopus 로고
    • Systematic generation of stochastic diversity as an intrusion barrier in survivable systems software
    • Washington, DC, USA, IEEE Computer Society, Los Alamitos
    • Linger, R.C.: Systematic generation of stochastic diversity as an intrusion barrier in survivable systems software. In: HICSS 1999: Proceedings of the Thirty-Second Annual Hawaii International Conference on System Sciences, Washington, DC, USA, 1999, vol. 3, p. 3062. IEEE Computer Society, Los Alamitos (1999)
    • (1999) HICSS 1999: Proceedings of the Thirty-Second Annual Hawaii International Conference on System Sciences , vol.3 , pp. 3062
    • Linger, R.C.1
  • 19
    • 0016572913 scopus 로고
    • A vector space model for automatic indexing
    • Salton, G., Wong, A., Yang, C.S.: A vector space model for automatic indexing. Communications of the ACM 18(11), 613-620 (1975)
    • (1975) Communications of the ACM , vol.18 , Issue.11 , pp. 613-620
    • Salton, G.1    Wong, A.2    Yang, C.S.3
  • 20
    • 70350670139 scopus 로고    scopus 로고
    • Singh, A.: Mac OS X Internals: A Systems Approach. Addison-Wesley, Reading (2006)
    • Singh, A.: Mac OS X Internals: A Systems Approach. Addison-Wesley, Reading (2006)
  • 21
    • 4243066282 scopus 로고    scopus 로고
    • Risks of monoculture
    • Stamp, M.: Risks of monoculture. Communications of the ACM 47(3), 120 (2004)
    • (2004) Communications of the ACM , vol.47 , Issue.3 , pp. 120
    • Stamp, M.1
  • 22
    • 33745650701 scopus 로고    scopus 로고
    • Totel, E., Majorczyk, F., Me, L.: COTS diversity based intrusion detection and application to web servers. In: Valdes, A., Zamboni, D. (eds.) RAID 2005. LNCS, 3858, pp. 43-62. Springer, Heidelberg (2006)
    • Totel, E., Majorczyk, F., Me, L.: COTS diversity based intrusion detection and application to web servers. In: Valdes, A., Zamboni, D. (eds.) RAID 2005. LNCS, vol. 3858, pp. 43-62. Springer, Heidelberg (2006)
  • 23
    • 70350669124 scopus 로고    scopus 로고
    • An overview of remote operating system fingerprinting
    • Technical report, The SANS Institute July
    • Trowbridge, C.: An overview of remote operating system fingerprinting. Technical report, The SANS Institute (July 2003)
    • (2003)
    • Trowbridge, C.1
  • 24
    • 70350659121 scopus 로고    scopus 로고
    • Vogt, P., Nentwich, F., Jovanovic, N., Kirda, E., Kruegel, C., Vigna, G.: Cross-site scripting prevention with dynamic data tainting and static analysis. In: Proceeding of the Network and Distributed System Security Symposium (NDSS) (February 2007)
    • Vogt, P., Nentwich, F., Jovanovic, N., Kirda, E., Kruegel, C., Vigna, G.: Cross-site scripting prevention with dynamic data tainting and static analysis. In: Proceeding of the Network and Distributed System Security Symposium (NDSS) (February 2007)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.