메뉴 건너뛰기




Volumn , Issue , 2012, Pages 833-844

Before we knew it: An empirical study of zero-day attacks in the real world

Author keywords

Full disclosure; Vulnerabilities; Zero day attacks

Indexed keywords

CYBER CRIMINALS; DATA SETS; EMPIRICAL STUDIES; FULL DISCLOSURES; HONEYPOTS; ORDERS OF MAGNITUDE; RARE EVENT; VULNERABILITIES; ZERO DAY ATTACK;

EID: 84869403808     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2382196.2382284     Document Type: Conference Paper
Times cited : (506)

References (40)
  • 2
    • 33750440197 scopus 로고    scopus 로고
    • The economics of information security
    • R. Anderson and T. Moore. The economics of information security. In Science, vol. 314, no. 5799, 2006.
    • (2006) Science , vol.314 , Issue.5799
    • Anderson, R.1    Moore, T.2
  • 3
    • 0034501876 scopus 로고    scopus 로고
    • Windows of vulnerability: A case study analysis
    • December
    • W. A. Arbaugh, W. L. Fithen, and J. McHugh. Windows of vulnerability: A case study analysis. IEEE Computer, 33(12), December 2000.
    • (2000) IEEE Computer , vol.33 , Issue.12
    • Arbaugh, W.A.1    Fithen, W.L.2    McHugh, J.3
  • 7
    • 50249085491 scopus 로고    scopus 로고
    • Automatic patch-based exploit generation is possible: Techniques and implications
    • Oakland, CA, May
    • D. Brumley, P. Poosankam, D. X. Song, and J. Zheng. Automatic patch-based exploit generation is possible: Techniques and implications. In IEEE Symposium on Security and Privacy, pages 143-157, Oakland, CA, May 2008.
    • (2008) IEEE Symposium on Security and Privacy , pp. 143-157
    • Brumley, D.1    Poosankam, P.2    Song, D.X.3    Zheng, J.4
  • 11
    • 78650062267 scopus 로고    scopus 로고
    • February
    • N. Falliere, L. O'Murchu, and E. Chien. W32.stuxnet dossier. http://www.symantec.com/content/en/us/enterprise/media/security-response/ whitepapers/w32-stuxnet-dossier.pdf, February 2011.
    • (2011) W32.stuxnet Dossier
    • Falliere, N.1    O'murchu, L.2    Chien, E.3
  • 13
    • 84869472054 scopus 로고    scopus 로고
    • End-point security failures, insight gained from secunia psi scans
    • February
    • S. Frei. End-Point Security Failures, Insight gained from Secunia PSI scans. Predict Workshop, February 2011.
    • (2011) Predict Workshop
    • Frei, S.1
  • 14
    • 84870640222 scopus 로고    scopus 로고
    • Google Inc. February
    • Google Inc. Pwnium: rewards for exploits, February 2012. http://blog.chromium.org/2012/02/pwnium-rewards-for-exploits.html.
    • (2012) Pwnium: Rewards for Exploits
  • 15
    • 84870641439 scopus 로고    scopus 로고
    • Shopping for zero-days: A price list for hackers' secret software exploits
    • 23 March
    • A. Greenberg. Shopping for zero-days: A price list for hackers' secret software exploits. Forbes, 23 March 2012. http://www.forbes.com/sites/ andygreenberg/2012/03/23/shopping-for-zero-days-an-\price-list-for-hackers- secret-software-exploits/.
    • (2012) Forbes
    • Greenberg, A.1
  • 17
    • 84870643111 scopus 로고    scopus 로고
    • RSA spearphish attack may have hit US defense organizations
    • 8 September
    • R. McMillan. RSA spearphish attack may have hit US defense organizations. PC World, 8 September 2011. http://www.pcworld.com/businesscenter/article/ 239728/rsa-spearphish-attack-may-have-hit-us-defense-organizations.html.
    • (2011) PC World
    • McMillan, R.1
  • 19
    • 84870650988 scopus 로고    scopus 로고
    • Microsoft. Microsoft security bulletins. http:// technet.microsoft.com/ en-us/security/bulletin, 2012.
    • (2012) Microsoft Security Bulletins
  • 20
    • 84869472047 scopus 로고    scopus 로고
    • The legitimate vulnerability market: Inside the secretive world of 0-day exploit sales
    • Pittsburgh, PA, June
    • C. Miller. The legitimate vulnerability market: Inside the secretive world of 0-day exploit sales. In Workshop on the Economics of Information Security, Pittsburgh, PA, June 2007.
    • (2007) Workshop on the Economics of Information Security
    • Miller, C.1
  • 24
  • 25
    • 79958736290 scopus 로고    scopus 로고
    • Toward a standard benchmark for computer security research: The Worldwide Intelligence Network Environment (WINE)
    • Salzburg, Austria, Apr
    • T. Dumitraş and D. Shou. Toward a standard benchmark for computer security research: The Worldwide Intelligence Network Environment (WINE). In EuroSys BADGERS Workshop, Salzburg, Austria, Apr 2011.
    • (2011) EuroSys BADGERS Workshop
    • Dumitraş, T.1    Shou, D.2
  • 27
    • 80955154992 scopus 로고    scopus 로고
    • 1 April. Retrieved on 19 April 2012
    • U. Rivner. Anatomy of an attack, 1 April 2011. http: //blogs.rsa.com/ rivner/anatomy-of-an-attack/ Retrieved on 19 April 2012.
    • (2011) Anatomy of An Attack
    • Rivner, U.1
  • 31
    • 19944429098 scopus 로고    scopus 로고
    • The nonsecurity of secrecy
    • B. Schneier. The nonsecurity of secrecy. In Commun. ACM, 2004.
    • (2004) Commun. ACM
    • Schneier, B.1
  • 33
    • 84870628356 scopus 로고    scopus 로고
    • April
    • Symantec Corporation. Symantec global Internet security threat report, volume 13. http://eval.symantec.com/mktginfo/enterprise/ white-papers/b- whitepaper-internet-security- threat-report-xiii-04-2008.en-us.pdf, April 2008.
    • (2008) Symantec Global Internet Security Threat Report , vol.13
  • 34
    • 84870628431 scopus 로고    scopus 로고
    • April
    • Symantec Corporation. Symantec global Internet security threat report, volume 14. http://eval.symantec.com/mktginfo/enterprise/white-papers/b- whitepaper-internet-security-threat-report-xv-04-2010.en-us.pdf,April2009.
    • (2009) Symantec Global Internet Security Threat Report , vol.14
  • 35
    • 84870645513 scopus 로고    scopus 로고
    • April
    • Symantec Corporation. Symantec global Internet security threat report, volume 15. http://msisac.cisecurity.org/resources/reports/documents/ SymantecInternetSecurityThreatReport2010.pdf, April 2010.
    • (2010) Symantec Global Internet Security Threat Report , vol.15
  • 38
    • 84870649588 scopus 로고    scopus 로고
    • Symantec Corporation. Symantec threat explorer. http://www.symantec.com/ security-response/threatexplorer/azlisting.jsp, 2012.
    • (2012) Symantec Threat Explorer
  • 39
    • 84870643100 scopus 로고    scopus 로고
    • Symantec.cloud
    • Symantec.cloud. February 2011 intelligence report. http://www. messagelabs.com/mlireport/MLI-2011-02-February-FINAL-en.PDF, 2011.
    • (2011) February 2011 Intelligence Report
  • 40
    • 14944365100 scopus 로고    scopus 로고
    • Reflections on Witty: Analyzing the attacker
    • June
    • N. Weaver and D. Ellis. Reflections on Witty: Analyzing the attacker. ;login: The USENIX Magazine, 29(3):34-37, June 2004.
    • (2004) Login: The USENIX Magazine , vol.29 , Issue.3 , pp. 34-37
    • Weaver, N.1    Ellis, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.