메뉴 건너뛰기




Volumn 27, Issue , 2007, Pages 147-170

Sting: An End-to-End Self-Healing System for Defending against Internet Worms

Author keywords

[No Author keywords available]

Indexed keywords


EID: 77953528520     PISSN: 15682633     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-0-387-44599-1_7     Document Type: Article
Times cited : (5)

References (69)
  • 1
    • 84882606900 scopus 로고    scopus 로고
    • K2, admmutate. http://www.ktwo.ca/c/ADMmutate-0.8.4.tar.gz
    • K2, admmutate
  • 3
    • 85084159869 scopus 로고    scopus 로고
    • Tied, libsafeplus: Tools for runtime buffer overflow protection
    • In, August
    • K. Avijit, P. Gupta, and D. Gupta. Tied, libsafeplus: Tools for runtime buffer overflow protection. In USENIX Security Symposium, August 2004.
    • (2004) USENIX Security Symposium
    • Avijit, K.1    Gupta, P.2    Gupta, D.3
  • 10
    • 24944574614 scopus 로고    scopus 로고
    • CERT/CC
    • CERT/CC. CERT/CC statistics 1988-2005. h t t p://w w w. c e r t. o r g/s t a t s/c e r t_s t a t s. h t m l.
    • CERT/CC statistics 1988-2005
  • 17
    • 33750355107 scopus 로고    scopus 로고
    • Minos: Architectural support for software security through control data integrity
    • In, December
    • J. R. Crandall and F. Chong. Minos: Architectural support for software security through control data integrity. In International Symposium on Microarchitecture, December 2004.
    • (2004) International Symposium on Microarchitecture
    • Crandall, J.R.1    Chong, F.2
  • 21
    • 84882725555 scopus 로고    scopus 로고
    • Dynamorio. http://www.cag.lcs.mit.edu/dynamorio/.
    • Dynamorio
  • 45
    • 84882727296 scopus 로고    scopus 로고
    • PaX. http://pax.gr security, net/.
    • PaX
  • 47
    • 84882601711 scopus 로고    scopus 로고
    • r code
    • r code. ATPhttpd exploit. http://www.cotse.com/mailing-lists/todays/att-0003/01-atphttp0x06.c.
    • ATPhttpd exploit
  • 50
  • 62
    • 12844267418 scopus 로고    scopus 로고
    • Secure program execution via dynamic information flow tracking
    • G. E. Suh, J. Lee, and S. Devadas. Secure program execution via dynamic information flow tracking. In Proceedings ofASPLOS, 2004.
    • (2004) Proceedings ofASPLOS
    • Suh, G.E.1    Lee, J.2    Devadas, S.3
  • 66
    • 33750352075 scopus 로고    scopus 로고
    • Shield: Vulnerability-driven network filters for preventing known vulnerability exploits
    • In, August
    • H. J. Wang, C. Guo, D. Simon, and A. Zugenmaier. Shield: Vulnerability-driven network filters for preventing known vulnerability exploits. In ACM SIGCOMM, August 2004.
    • (2004) ACM SIGCOMM
    • Wang, H.J.1    Guo, C.2    Simon, D.3    Zugenmaier, A.4
  • 68
    • 27644552867 scopus 로고    scopus 로고
    • Technical report. Center for Reliable and Higher Performance Computing, University of Illinois at Urbana-Champaign, May
    • J. Xu, Z. Kalbarczyk, and R. K. Iyer. Transparent runtime randomization for security. Technical report. Center for Reliable and Higher Performance Computing, University of Illinois at Urbana-Champaign, May 2003.
    • (2003) Transparent runtime randomization for security
    • Xu, J.1    Kalbarczyk, Z.2    Iyer, R.K.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.