메뉴 건너뛰기




Volumn 5587 LNCS, Issue , 2009, Pages 68-87

Yataglass: Network-level code emulation for analyzing memory-scanning attacks

Author keywords

Code injection attack; Intrusion analysis; Intrusion detection; Memory scanning attack; Network level code emulation

Indexed keywords

CODE-INJECTION ATTACK; COMPUTER SECURITY; INTRUSION ANALYSIS; MEMORY-SCANNING ATTACK; NETWORK-LEVEL CODE EMULATION; REMOTE CODE; SHELLCODE;

EID: 70350658277     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-02918-9_5     Document Type: Conference Paper
Times cited : (5)

References (37)
  • 6
    • 0033295259 scopus 로고    scopus 로고
    • Bro: A system for detecting network intruders in real-time
    • Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer Networks 31(23-24), 2435-2463 (1999)
    • (1999) Computer Networks , vol.31 , Issue.23-24 , pp. 2435-2463
    • Paxson, V.1
  • 7
    • 33745647290 scopus 로고    scopus 로고
    • Chinchani, R., Berg, E.V.D.: A fast static analysis approach to detect exploit code in network flows. In: Valdes, A., Zamboni, D. (eds.) RAID 2005. LNCS, 3858, pp. 284-308. Springer, Heidelberg (2006)
    • Chinchani, R., Berg, E.V.D.: A fast static analysis approach to detect exploit code in network flows. In: Valdes, A., Zamboni, D. (eds.) RAID 2005. LNCS, vol. 3858, pp. 284-308. Springer, Heidelberg (2006)
  • 8
    • 84869651774 scopus 로고    scopus 로고
    • The Metasploit Project
    • The Metasploit Project: Metasploit, http://www.metasploit.com/
    • Metasploit
  • 9
    • 70350669099 scopus 로고    scopus 로고
    • Bania, P.: Tapion (2005), http://pb.specialised.info/all/tapion/
    • Bania, P.: Tapion (2005), http://pb.specialised.info/all/tapion/
  • 10
    • 48649084883 scopus 로고    scopus 로고
    • K2: Admmutate (2007), http://www.ktwo.ca/ADMmutate-0.8.4.tar.gz
    • (2007) K2: Admmutate
  • 11
    • 70350659097 scopus 로고    scopus 로고
    • Sedalo, M.: Jempiscode (2006), http://goodfellas.shellcode.com.ar/ proyectos.html
    • Sedalo, M.: Jempiscode (2006), http://goodfellas.shellcode.com.ar/ proyectos.html
  • 12
    • 33745670395 scopus 로고    scopus 로고
    • Kruegel, C., Kirda, E., Mutz, D., Robertson, W., Vigna, G.: Polymorphic worm detection using structural information of executables. In: Valdes, A., Zamboni, D. (eds.) RAID 2005. LNCS, 3858, pp. 207-226. Springer, Heidelberg (2006)
    • Kruegel, C., Kirda, E., Mutz, D., Robertson, W., Vigna, G.: Polymorphic worm detection using structural information of executables. In: Valdes, A., Zamboni, D. (eds.) RAID 2005. LNCS, vol. 3858, pp. 207-226. Springer, Heidelberg (2006)
  • 13
    • 33746446345 scopus 로고    scopus 로고
    • Network-level polymorphic shellcode detection using emulation
    • Büschkes, R, Laskov, P, eds, DIMVA 2006, Springer, Heidelberg
    • Polychronakis, M., Anagnostakis, K.G., Markatos, E.P.: Network-level polymorphic shellcode detection using emulation. In: Büschkes, R., Laskov, P. (eds.) DIMVA 2006. LNCS, vol. 4064, pp. 54-73. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4064 , pp. 54-73
    • Polychronakis, M.1    Anagnostakis, K.G.2    Markatos, E.P.3
  • 16
    • 38149093160 scopus 로고    scopus 로고
    • Polychronakis, M., Anagnostakis, K.G., Markatos, E.P.: Emulation-based detection of non-self-contained polymorphic shellcode. In: Kruegel, C., Lippmann, R., Clark, A. (eds.) RAID 2007. LNCS, 4637, pp. 87-106. Springer, Heidelberg (2007)
    • Polychronakis, M., Anagnostakis, K.G., Markatos, E.P.: Emulation-based detection of non-self-contained polymorphic shellcode. In: Kruegel, C., Lippmann, R., Clark, A. (eds.) RAID 2007. LNCS, vol. 4637, pp. 87-106. Springer, Heidelberg (2007)
  • 18
    • 84868352987 scopus 로고    scopus 로고
    • Linn, C.M., Rajagopalan, M., Baker, S., Collberg, C., Debray, S.K., Hartman, J.: Protecting against unexpected system calls. In: Proc. of the 13th Usenix Security Symposium, August 2005, pp. 239-254 (2005)
    • Linn, C.M., Rajagopalan, M., Baker, S., Collberg, C., Debray, S.K., Hartman, J.: Protecting against unexpected system calls. In: Proc. of the 13th Usenix Security Symposium, August 2005, pp. 239-254 (2005)
  • 19
    • 85027555608 scopus 로고    scopus 로고
    • Wang, X., Pan, C.C., Liu, P., Zhu, S.: SigFree: A Signature-free Buffer Overflow Attack Blocker. In: Proc. of the 15th Usenix Security Symposium, pp. 225-240 (2006)
    • Wang, X., Pan, C.C., Liu, P., Zhu, S.: SigFree: A Signature-free Buffer Overflow Attack Blocker. In: Proc. of the 15th Usenix Security Symposium, pp. 225-240 (2006)
  • 22
    • 58449115871 scopus 로고    scopus 로고
    • Bitscope: Automatically dissecting malicious binaries
    • Technical Report CMU-CS-07-133, Carnegie Mellon University
    • Brumley, D., Hartwig, C., Kang, M.G., Liang, Z., Newsome, J., Poosankam, P., Song, D., Yin, H.: Bitscope: Automatically dissecting malicious binaries. Technical Report CMU-CS-07-133, Carnegie Mellon University (2007)
    • (2007)
    • Brumley, D.1    Hartwig, C.2    Kang, M.G.3    Liang, Z.4    Newsome, J.5    Poosankam, P.6    Song, D.7    Yin, H.8
  • 24
    • 84869658590 scopus 로고    scopus 로고
    • jt: Libdasm (2006), http://www.klake.org/~jt/misc/libdasm-1.5.tar.gz
    • (2006)
    • jt1    Libdasm2
  • 32
  • 33
    • 84869654602 scopus 로고    scopus 로고
    • Milw0rm: http://www.milw0rm.com/
    • Milw0rm


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.