메뉴 건너뛰기




Volumn 5758 LNCS, Issue , 2009, Pages 161-181

Towards generating high coverage vulnerability-based signatures with protocol-level constraint-guided exploration

Author keywords

[No Author keywords available]

Indexed keywords

CURRENT SIGNATURES; NEW APPROACHES; REACHABILITY; REAL-WORLD; SMALL VARIATIONS;

EID: 76649114637     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-04342-0_9     Document Type: Conference Paper
Times cited : (15)

References (39)
  • 1
    • 56449089645 scopus 로고    scopus 로고
    • Symantec: Internet security threat report (2008), http://www.symantec. com/business/theme.jsp?themeid=threatreport
    • (2008) Internet security threat report
  • 2
    • 33646048960 scopus 로고    scopus 로고
    • Honeycomb - creating intrusion detection signatures using honeypots
    • Boston, MA
    • Kreibich, C., Crowcroft, J.: Honeycomb - creating intrusion detection signatures using honeypots. In: Workshop on Hot Topics in Networks, Boston, MA (2003)
    • (2003) Workshop on Hot Topics in Networks
    • Kreibich, C.1    Crowcroft, J.2
  • 3
    • 85084163246 scopus 로고    scopus 로고
    • Autograph: Toward automated, distributed worm signature detection
    • San Diego, CA
    • Kim, H.A., Karp, B.: Autograph: Toward automated, distributed worm signature detection. In: USENIX Security Symposium, San Diego, CA (2004)
    • (2004) USENIX Security Symposium
    • Kim, H.A.1    Karp, B.2
  • 5
    • 27544498978 scopus 로고    scopus 로고
    • Polygraph: Automatically generating signatures for polymorphic worms
    • Oakland, CA
    • Newsome, J., Karp, B., Song, D.: Polygraph: Automatically generating signatures for polymorphic worms. In: IEEE Symposium on Security and Privacy, Oakland, CA (2005)
    • (2005) IEEE Symposium on Security and Privacy
    • Newsome, J.1    Karp, B.2    Song, D.3
  • 7
    • 33751064824 scopus 로고    scopus 로고
    • Hamsa: Fast signature generation for zero-day polymorphic worms with provable attack resilience
    • Oakland, CA
    • Li, Z., Sanghi, M., Chen, Y., Kao, M.Y., Chavez, B.: Hamsa: Fast signature generation for zero-day polymorphic worms with provable attack resilience. In: IEEE Symposium on Security and Privacy, Oakland, CA (2006)
    • (2006) IEEE Symposium on Security and Privacy
    • Li, Z.1    Sanghi, M.2    Chen, Y.3    Kao, M.Y.4    Chavez, B.5
  • 8
    • 33745800070 scopus 로고    scopus 로고
    • Fast and automated generation of attack signatures: A basis for building self-protecting servers
    • Alexandria, VA
    • Liang, Z., Sekar, R.: Fast and automated generation of attack signatures: A basis for building self-protecting servers. In: ACM Conference on Computer and Communications Security, Alexandria, VA (2005)
    • (2005) ACM Conference on Computer and Communications Security
    • Liang, Z.1    Sekar, R.2
  • 9
    • 33846294027 scopus 로고    scopus 로고
    • Automatic generation of buffer overflow attack signatures: An approach based on program behavior models
    • Tucson, AZ
    • Liang, Z., Sekar, R.: Automatic generation of buffer overflow attack signatures: An approach based on program behavior models. In: Annual Computer Security Applications Conference, Tucson, AZ (2005)
    • (2005) Annual Computer Security Applications Conference
    • Liang, Z.1    Sekar, R.2
  • 18
    • 34548717095 scopus 로고    scopus 로고
    • Shieldgen: Automatic data patch generation for unknown vulnerabilities with informed probing
    • Oakland, CA
    • Cui, W., Peinado, M., Wang, H.J., Locasto, M.: Shieldgen: Automatic data patch generation for unknown vulnerabilities with informed probing. In: IEEE Symposium on Security and Privacy, Oakland, CA (2007)
    • (2007) IEEE Symposium on Security and Privacy
    • Cui, W.1    Peinado, M.2    Wang, H.J.3    Locasto, M.4
  • 20
    • 84868185044 scopus 로고    scopus 로고
    • A dumb patch? http://blogs.technet.com/msrc/archive/2005/10/31/413402. aspx
    • A dumb patch
  • 22
    • 84868167124 scopus 로고    scopus 로고
    • Wireshark, http://www.wireshark.org
    • Wireshark
  • 28
    • 74049090626 scopus 로고    scopus 로고
    • Automatic protocol format reverse engineering through context-aware monitored execution
    • San Diego, CA
    • Lin, Z., Jiang, X., Xu, D., Zhang, X.: Automatic protocol format reverse engineering through context-aware monitored execution. In: Network and Distributed System Security Symposium, San Diego, CA (2008)
    • (2008) Network and Distributed System Security Symposium
    • Lin, Z.1    Jiang, X.2    Xu, D.3    Zhang, X.4
  • 29
    • 79953672829 scopus 로고    scopus 로고
    • Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
    • San Diego, CA
    • Newsome, J., Song, D.: Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In: Network and Distributed System Security Symposium, San Diego, CA (2005)
    • (2005) Network and Distributed System Security Symposium
    • Newsome, J.1    Song, D.2
  • 33
    • 84868172657 scopus 로고    scopus 로고
    • Vine, http://bitblaze.cs.berkeley.edu/vine.html
    • Vine
  • 34
    • 76649137779 scopus 로고    scopus 로고
    • Caballero, J., McCamant, S., Barth, A., Song, D.: Extracting models of security-sensitive operations using string-enhanced white-box exploration on binaries. Technical Report UCB/EECS-2009-36, EECS Department, University of California, Berkeley (2009)
    • Caballero, J., McCamant, S., Barth, A., Song, D.: Extracting models of security-sensitive operations using string-enhanced white-box exploration on binaries. Technical Report UCB/EECS-2009-36, EECS Department, University of California, Berkeley (2009)
  • 36
    • 84868171944 scopus 로고    scopus 로고
    • Towards generating high coverage vulnerability-based signatures with protocol-level constraint-guided exploration extended version
    • Towards generating high coverage vulnerability-based signatures with protocol-level constraint-guided exploration (extended version), http://www.ece.cmu.edu/~juanca/papers/fieldsig-extended.pdf
  • 39
    • 0016543936 scopus 로고
    • Guarded commands, nondeterminacy and formal derivation of programs
    • Dijkstra, E.W.: Guarded commands, nondeterminacy and formal derivation of programs. Communications of the ACM 18(8) (1975)
    • (1975) Communications of the ACM , vol.18 , Issue.8
    • Dijkstra, E.W.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.