메뉴 건너뛰기




Volumn , Issue , 2009, Pages 605-609

Generating vulnerability signatures for string manipulating programs using automata-based forward and backward symbolic analyses

Author keywords

[No Author keywords available]

Indexed keywords

ATTACK PATTERNS; BACKWARD ANALYSIS; DETERMINISTIC FINITE AUTOMATA; IMAGE COMPUTATION; POTENTIAL ATTACK; PROGRAM POINTS; REACHABILITY ANALYSIS; REGULAR EXPRESSIONS; STRING ANALYSIS; SYMBOLIC ANALYSIS; VULNERABILITY SIGNATURE;

EID: 77952112519     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ASE.2009.20     Document Type: Conference Paper
Times cited : (29)

References (5)
  • 1
    • 55949090271 scopus 로고    scopus 로고
    • Theory and techniques for automatic generation of vulnerability-based signatures
    • D. Brumley, J. Newsome, D. Song, H. Wang, and S. Jha, "Theory and techniques for automatic generation of vulnerability-based signatures," IEEE Trans. Dependable Sec. Comput., vol. 5, no.4, pp. 224-241, 2008.
    • (2008) IEEE Trans. Dependable Sec. Comput. , vol.5 , Issue.4 , pp. 224-241
    • Brumley, D.1    Newsome, J.2    Song, D.3    Wang, H.4    Jha, S.5
  • 2
    • 54249102273 scopus 로고    scopus 로고
    • Symbolic string verification: An automata-based approach
    • F. Yu, T. Bultan, M. Cova, and O. H. Ibarra, "Symbolic string verification: An automata-based approach," in Proc. of SPIN, 2008, pp. 306-324.
    • Proc. of SPIN, 2008 , pp. 306-324
    • Yu, F.1    Bultan, T.2    Cova, M.3    Ibarra, O.H.4
  • 3
    • 35048885595 scopus 로고    scopus 로고
    • Creating vulnerability signatures using weakest preconditions
    • D. Brumley, H. Wang, S. Jha, and D. X. Song, "Creating vulnerability signatures using weakest preconditions," in Proc. of CSF, 2007, pp. 311-325.
    • Proc. of CSF, 2007 , pp. 311-325
    • Brumley, D.1    Wang, H.2    Jha, S.3    Song, D.X.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.