메뉴 건너뛰기




Volumn , Issue , 2011, Pages 26-37

Finding protocol manipulation attacks

Author keywords

Reliability; Security

Indexed keywords

802.11 MAC; COMPLEX PROTOCOLS; FALSE POSITIVE; OR-NETWORKS; PROTOCOL IMPLEMENTATION; SECURITY; SEMANTIC DIFFERENCE; SYMBOLIC EXECUTION;

EID: 80053145619     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2018436.2018440     Document Type: Conference Paper
Times cited : (38)

References (31)
  • 1
    • 84925368904 scopus 로고    scopus 로고
    • 802.11 denial-of-service attacks: Real vulnerabilities and practical solutions
    • J. Bellardo and S. Savage. 802.11 denial-of-service attacks: real vulnerabilities and practical solutions. In USENIX Security, 2003.
    • (2003) USENIX Security
    • Bellardo, J.1    Savage, S.2
  • 2
    • 84863702961 scopus 로고    scopus 로고
    • Server-side verification of client behavior in online games
    • D. Bethea, R. Cochran, and M. K. Reiter. Server-side Verification of Client Behavior in Online Games. In NDSS, 2010.
    • (2010) NDSS
    • Bethea, D.1    Cochran, R.2    Reiter, M.K.3
  • 3
    • 50249085491 scopus 로고    scopus 로고
    • Automatic patch-based exploit generation is possible: Techniques and implications
    • D. Brumley, P. Poosankam, D. X. Song, and J. Zheng. Automatic patch-based exploit generation is possible: Techniques and implications. In Security and Privacy, 2008.
    • (2008) Security and Privacy
    • Brumley, D.1    Poosankam, P.2    Song, D.X.3    Zheng, J.4
  • 4
    • 80053044524 scopus 로고    scopus 로고
    • Towards generating high coverage vulnerability-based signatures with protocol-level constraint-guided exploration
    • J. Caballero, Z. Liang, P. Poosankam, and D. Song. Towards generating high coverage vulnerability-based signatures with protocol-level constraint-guided exploration. In RAID, 2009.
    • (2009) RAID
    • Caballero, J.1    Liang, Z.2    Poosankam, P.3    Song, D.4
  • 5
    • 67650790221 scopus 로고    scopus 로고
    • Klee: Unassisted and automatic generation of high-coverage tests for complex systems programs
    • C. Cadar, D. Dunbar, and D. Engler. Klee: Unassisted and automatic generation of high-coverage tests for complex systems programs. In OSDI, 2008.
    • (2008) OSDI
    • Cadar, C.1    Dunbar, D.2    Engler, D.3
  • 6
    • 80053153597 scopus 로고    scopus 로고
    • Exe: A system for automatically generating inputs of death using symbolic execution
    • C. Cadar, P. Twohey, V. Ganesh, and D. Engler. Exe: A system for automatically generating inputs of death using symbolic execution. In CCS, 2006.
    • (2006) CCS
    • Cadar, C.1    Twohey, P.2    Ganesh, V.3    Engler, D.4
  • 8
    • 76749150920 scopus 로고    scopus 로고
    • Netcomplex: A complexity metric for networked system designs
    • B.-G. Chun, S. Ratnasamy, and E. Kohler. Netcomplex: A complexity metric for networked system designs. In NSDI, 2008.
    • (2008) NSDI
    • Chun, B.-G.1    Ratnasamy, S.2    Kohler, E.3
  • 9
    • 70450092967 scopus 로고    scopus 로고
    • Bouncer: Securing software by blocking bad input
    • M. Costa, M. C. L. Zhou, L. Zhang, and M. Peinado. Bouncer: securing software by blocking bad input. In SOSP, 2007.
    • (2007) SOSP
    • Costa, M.1    Zhou, M.C.L.2    Zhang, L.3    Peinado, M.4
  • 10
  • 13
    • 31844450371 scopus 로고    scopus 로고
    • DART: Directed automated random testing
    • P. Godefroid, N. Klarlund, and K. Sen. DART: directed automated random testing. In PLDI, 2005.
    • (2005) PLDI
    • Godefroid, P.1    Klarlund, N.2    Sen, K.3
  • 14
    • 85028155431 scopus 로고    scopus 로고
    • Life, death, and the critical transition: Finding liveness bugs in systems code
    • C. E. Killian, J. W. Anderson, R. Jhala, and A. Vahdat. Life, death, and the critical transition: Finding liveness bugs in systems code. In NSDI, 2007.
    • (2007) NSDI
    • Killian, C.E.1    Anderson, J.W.2    Jhala, R.3    Vahdat, A.4
  • 15
    • 0016971687 scopus 로고
    • Symbolic execution and program testing
    • J. C. King. Symbolic execution and program testing. Commun. ACM, 19(7), 1976.
    • (1976) Commun ACM , vol.19 , Issue.7
    • King, J.C.1
  • 17
  • 18
    • 10844221463 scopus 로고    scopus 로고
    • Model checking large network protocol implementations
    • M. Musuvathi and D. R. Engler. Model checking large network protocol implementations. In NSDI, 2004.
    • (2004) NSDI
    • Musuvathi, M.1    Engler, D.R.2
  • 20
    • 34548307187 scopus 로고    scopus 로고
    • Using channel hopping to increase 802.11 resilience to jamming attacks
    • V. Navda, A. Bohra, and S. Ganguly. Using channel hopping to increase 802.11 resilience to jamming attacks. In IEEE Infocom Mini Symp., 2007.
    • (2007) IEEE Infocom Mini Symp.
    • Navda, V.1    Bohra, A.2    Ganguly, S.3
  • 21
    • 1542355459 scopus 로고    scopus 로고
    • CIL: Intermediate language and tools for analysis and transformation of C programs
    • G. C. Necula, S. McPeak, S. Rahul, and W. Weimer. CIL: Intermediate language and tools for analysis and transformation of C programs. In CCC, 2002.
    • (2002) CCC
    • Necula, G.C.1    McPeak, S.2    Rahul, S.3    Weimer, W.4
  • 22
    • 79953672829 scopus 로고    scopus 로고
    • Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
    • J. Newsome and D. Song. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In NDSS, 2005.
    • (2005) NDSS
    • Newsome, J.1    Song, D.2
  • 25
    • 0003792238 scopus 로고    scopus 로고
    • Stream control transmission protocol
    • Stream control transmission protocol. IETF RFC 2960, 2000.
    • (2000) IETF RFC 2960
  • 27
    • 80053152039 scopus 로고    scopus 로고
    • Security attacks found against the stream control transmission protocol (SCTP) and current countermeasures
    • Security attacks found against the stream control transmission protocol (SCTP) and current countermeasures. IETF RFC 5062, 2007.
    • (2007) IETF RFC 5062
  • 29
    • 80053168763 scopus 로고    scopus 로고
    • Can you fool me? towards automatically checking protocol gullibility
    • M. Stanojevic, R. Mahajan, T. Millstein, and M. Musuvathi. Can you fool me? towards automatically checking protocol gullibility. In HotNets, 2008.
    • (2008) HotNets
    • Stanojevic, M.1    Mahajan, R.2    Millstein, T.3    Musuvathi, M.4
  • 30
    • 43149111827 scopus 로고    scopus 로고
    • Pex: White box test generation for .NET
    • Tests and Proofs
    • N. Tillmann and J. de Halleux. Pex: White box test generation for .NET. In Tests and Proofs, LNCS. 2008.
    • (2008) LNCS
    • Tillmann, N.1    De Halleux, J.2
  • 31
    • 85076880480 scopus 로고    scopus 로고
    • Crystalball: Predicting and preventing inconsistencies in deployed distributed systems
    • M. Yabandeh, N. Knezevic, D. Kostic, and V. Kuncak. Crystalball: predicting and preventing inconsistencies in deployed distributed systems. In NSDI, 2009.
    • (2009) NSDI
    • Yabandeh, M.1    Knezevic, N.2    Kostic, D.3    Kuncak, V.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.