메뉴 건너뛰기




Volumn 297, Issue , 2009, Pages 63-75

Discovering application-level insider attacks using symbolic execution

Author keywords

[No Author keywords available]

Indexed keywords

ADDRESS SPACE; ASSEMBLY LANGUAGE; ATTACK GOALS; FORMAL TECHNIQUES; INSIDER ATTACK; PROGRAM CODE; SECURITY-CRITICAL; SYMBOLIC EXECUTION;

EID: 84868133952     PISSN: 18684238     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-642-01244-0_6     Document Type: Conference Paper
Times cited : (9)

References (21)
  • 4
    • 38149049950 scopus 로고    scopus 로고
    • Where Can an Insider Attack?
    • In: Dimitrakos, T., Martinelli, F., Ryan, P.Y.A., Schneider, S. (eds.) vol.,. Springer, Heidelberg
    • Probst, C.W., Hansen, R.R., Nielson, F.: Where Can an Insider Attack? In: Dimitrakos, T., Martinelli, F., Ryan, P.Y.A., Schneider, S. (eds.) FAST 2006. LNCS, vol. 4691, pp. 127-142. Springer, Heidelberg (2007)
    • (2007) FAST 2006. LNCS , vol.4691 , pp. 127-142
    • Probst, C.W.1    Hansen, R.R.2    Nielson, F.3
  • 6
    • 84885045405 scopus 로고    scopus 로고
    • OpenSSH Development Team
    • OpenSSH Development Team., OpenSSH 4.21 (2004)
    • (2004) OpenSSH 4.21
  • 11
  • 12
    • 0016971687 scopus 로고
    • Symbolic execution and program testing
    • King, J.C.: Symbolic execution and program testing. Commun. ACM 19(7), 385-394 (1976)
    • (1976) Commun. ACM , vol.19 , Issue.7 , pp. 385-394
    • King, J.C.1
  • 17
    • 0031123369 scopus 로고    scopus 로고
    • Fault Injection Techniques and Tools
    • Hsueh, M.-C., Tsai, T.K., Iyer, R.K.: Fault Injection Techniques and Tools. IEEE Computer 30(4), 75-82 (1997)
    • (1997) IEEE Computer , vol.30 , Issue.4 , pp. 75-82
    • Hsueh, M.-C.1    Tsai, T.K.2    Iyer, R.K.3
  • 18
    • 84957355967 scopus 로고    scopus 로고
    • On the importance of checking cryptographic protocols for faults
    • In: Fumy, W. (ed.) Springer, Heidelberg
    • Boneh, D., DeMillo, R., Lipton, R.J.: On the importance of checking cryptographic protocols for faults. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 37-51. Springer, Heidelberg (1997)
    • (1997) EUROCRYPT 1997. LNCS , vol.1233 , pp. 37-51
    • Boneh, D.1    DeMillo, R.2    Lipton, R.J.3
  • 19
    • 84939573910 scopus 로고    scopus 로고
    • Differential Power Analysis
    • In: Wiener, M. (ed.) Springer, Heidelberg
    • Kocher, P.C., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, p. 388. Springer, Heidelberg (1999)
    • (1999) CRYPTO 1999. LNCS , vol.1666 , pp. 388
    • Kocher, P.C.1    Jaffe, J.2    Jun, B.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.