메뉴 건너뛰기




Volumn 181, Issue , 2005, Pages 375-391

Stride: Polymorphic sled detection through instruction sequence analysis

Author keywords

buffer overflow detection; intrusion detection; security

Indexed keywords

BUFFER OVERFLOW ATTACKS; BUFFER OVERFLOWS; COMPUTATIONALLY EFFICIENT; SECURITY; SECURITY THREATS; SELFPROPAGATION; SEQUENCE ANALYSIS; TRANSFER CONTROL;

EID: 84866362135     PISSN: 18684238     EISSN: None     Source Type: Book Series    
DOI: 10.1007/0-387-25660-1_25     Document Type: Conference Paper
Times cited : (58)

References (22)
  • 12
    • 33645264610 scopus 로고    scopus 로고
    • White Paper, Sept
    • P. Szor and P. Ferrie. Hunting for metamorphic. White Paper, Sept. 2001. http://www. symantec, com/avcenter/referencelhunting.for.metamorphic.pdf.
    • (2001) Hunting for metamorphic
    • Szor, P.1    Ferrie, P.2
  • 13
    • 85090433665 scopus 로고    scopus 로고
    • Snort: Lightweight intrusion detection for networks
    • In, Nov. software available from
    • M. Roesch. Snort: Lightweight intrusion detection for networks. In Proceedings of USENIX LISA 99, Nov. 1999. (software available from http://www.snort.org/).
    • (1999) Proceedings of USENIX LISA 99
    • Roesch, M.1
  • 16
    • 84882606900 scopus 로고    scopus 로고
    • K2. ADMmutate. http://www.ktwo.ca/ADMmutate-0.8.4.tar.gz.
    • K2. ADMmutate
  • 17
  • 20
    • 84886369267 scopus 로고    scopus 로고
    • Prelude IDS, http://www.prelude-ids.org/.
    • Prelude IDS
  • 21
    • 84886361461 scopus 로고    scopus 로고
    • NIDS Find Shellcode. http://www.ngsec.com/downloads/misc/NIDSfindshellcode.tgz.
    • NIDS Find Shellcode


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.