메뉴 건너뛰기




Volumn , Issue , 2013, Pages 396-403

Trusted computing vs. Advanced persistent threats: Can a defender win this game?

Author keywords

Advanced Persistent Threat; Duqu; Flame; MiniDuke; Red October; Stuxnet; Trusted Computing

Indexed keywords


EID: 84894112637     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/UIC-ATC.2013.80     Document Type: Conference Paper
Times cited : (68)

References (36)
  • 1
    • 84894138122 scopus 로고    scopus 로고
    • Fisher, D.: Threatpost. [Online] 15 June 2012 [Cited: 01 02 2013]
    • Fisher, D.: Threatpost. [Online] 15 June 2012 [Cited: 01 02 2013] https://threatpost.com/en-us/blogs/what-have-welearned-flame-malware-061512
  • 6
    • 84894214552 scopus 로고    scopus 로고
    • Symantec, W32.Duqu-The precursor to the next Stuxnet, Symantec, 2011
    • Symantec, W32.Duqu-The precursor to the next Stuxnet, Symantec, 2011.
  • 9
    • 84894129976 scopus 로고    scopus 로고
    • Kaspersky Labs. [Online] 28 May 2012 [Cited: 01 January 2013
    • Kaspersky Labs. [Online] 28 May 2012 [Cited: 01 January 2013] http://www.securelist.com/en/blog?weblogid=208193522
  • 10
    • 84894144461 scopus 로고    scopus 로고
    • Kaspersky Labs Red October" Diplomatic Cyber Attacks Investigation. [Online] 14 01 2013 [Cited: 15 01 2013]
    • Kaspersky Labs. "Red October" Diplomatic Cyber Attacks Investigation. [Online] 14 01 2013 [Cited: 15 01 2013] http://www.securelist. com/en/analysis/204792262/Red-Octo ber-Diplomatic-Cyber-Attacks-Investigation
  • 11
    • 84894223862 scopus 로고    scopus 로고
    • Tivadar, M., Balazs, B., Istrate, C., A closer look at Miniduke. [Online] [Cited: 20 05 2013]
    • Tivadar, M., Balazs, B., Istrate, C., A closer look at Miniduke. [Online] [Cited: 20 05 2013] http://labs. bitdefend-er.com/wp-content/uploads/downloads/ 2013/04/ MiniDuke- Paper-Final.pdf
  • 18
    • 17444421583 scopus 로고    scopus 로고
    • Does trusted computing remedy computer security problems
    • Oppliger, R., Rytz, R., "Does trusted computing remedy computer security problems?", Security &Privacy, IEEE, 3(2), 16-19, 2005.
    • (2005) Security &Privacy, IEEE , vol.3 , Issue.2 , pp. 16-19
    • Oppliger, R.1    Rytz, R.2
  • 20
    • 84882242289 scopus 로고    scopus 로고
    • On the feasibility of malware attacks in smartphone platforms
    • Springer (CCIS-314)
    • Mylonas, A., Dritsas, S., Tsoumas, B., Gritzalis, D., "On the feasibility of malware attacks in smartphone platforms", Security and Cryptography, pp. 217-232, Springer (CCIS-314), 2012.
    • (2012) Security and Cryptography , pp. 217-232
    • Mylonas, A.1    Dritsas, S.2    Tsoumas, B.3    Gritzalis, D.4
  • 21
    • 1642275386 scopus 로고    scopus 로고
    • Embedding privacy in it applications development
    • Gritzalis, D., "Embedding privacy in IT applications development", Information Management &Computer Security, vol. 12, no. 1, pp. 8-26, 2004.
    • (2004) Information Management &Computer Security , vol.12 , Issue.1 , pp. 8-26
    • Gritzalis, D.1
  • 22
    • 84894131690 scopus 로고    scopus 로고
    • Lemos, R., Infoworld. [Online] 19 January 2011 [Cited: 02 February 2013]
    • Lemos, R., Infoworld. [Online] 19 January 2011 [Cited: 02 February 2013] http://www.infoworld.com/t/malware/stux net-attack-more-effective-bombs-888
  • 23
    • 84894134938 scopus 로고    scopus 로고
    • Symantec, Stuxnet 0.5: The missing link, Symantec, 2013
    • Symantec, Stuxnet 0.5: The missing link, Symantec, 2013.
  • 24
    • 84894133523 scopus 로고    scopus 로고
    • Kaspersky Labs. [Online] 11 June 2012. [Cited: 3 February 2013.]
    • Kaspersky Labs. [Online] 11 June 2012. [Cited: 3 February 2013.] http://www.kaspersky.com/about/news/virus/2012/Re source-207-Kaspersky-Lab- Research-Proves-that- Stuxnet -and-Flame-Developers-are-Connected
  • 25
    • 84894219959 scopus 로고    scopus 로고
    • Field, S., An introduction to kernel patch protection. [Online] 12 August 2006. [Cited: 08 February 2013.]
    • Field, S., An introduction to kernel patch protection. [Online] 12 August 2006. [Cited: 08 February 2013.] http://blogs.msdn.com/b
  • 26
    • 84894107723 scopus 로고    scopus 로고
    • Microsoft: [Online] [Cited: 11 02 2013.]
    • Microsoft: [Online] [Cited: 11 02 2013.] http://office.microsoft.com/en- 001/excel-help/what-isprotected-view-HA010355931.aspx.
  • 27
    • 84894159056 scopus 로고    scopus 로고
    • Schneier, B., www.schneier.com. [Online] 19 June 2012. [Cited: 6 February 2013.]
    • Schneier, B., www.schneier.com. [Online] 19 June 2012. [Cited: 6 February 2013.] http://www.schneier.com /blog/archives/2012/06/the-failure-of-3.html.
  • 29
    • 0028742960 scopus 로고
    • Intrusion detection: Evaluation and performance issues of the securenet system
    • Denault, M., Gritzalis, D., Karagiannis, D., Spirakis, P., "Intrusion detection: Evaluation and performance issues of the SECURENET system", Computers &Security, vol. 13, no. 6, pp. 495-508, 1994.
    • (1994) Computers &Security , vol.13 , Issue.6 , pp. 495-508
    • Denault, M.1    Gritzalis, D.2    Karagiannis, D.3    Spirakis, P.4
  • 30
    • 84894176862 scopus 로고    scopus 로고
    • Diode réseau et exefilter: 2 projects pour des interconnexions sécurisées
    • Lagadec P., "Diode réseau et ExeFilter: 2 projects pour des interconnexions sécurisées", in Proc. of SSTIC06, pp. 1-15, 2006.
    • (2006) Proc. of SSTIC06 , pp. 1-15
    • Lagadec, P.1
  • 31
    • 84894180876 scopus 로고    scopus 로고
    • Alexa Top Sites
    • Alexa Top Sites-http://www.alexa.com/topsites
  • 32
    • 0029483547 scopus 로고
    • Design of a neural network for recognition and classification of computer viruses
    • October
    • Doumas, A., Mavroudakis, K., Gritzalis, D., Katsikas, S., "Design of a neural network for recognition and classification of computer viruses", Computers &Security, vol. 14, no. 5, pp. 435-448, October 1995.
    • (1995) Computers &Security , vol.14 , Issue.5 , pp. 435-448
    • Doumas, A.1    Mavroudakis, K.2    Gritzalis, D.3    Katsikas, S.4
  • 33
    • 84860394158 scopus 로고    scopus 로고
    • Enhancing security and improving interoperability in healthcare information systems
    • Gritzalis, D., "Enhancing security and improving interoperability in healthcare information systems", Informatics for Health and Social Care, vol. 23, no. 4, pp. 309-324, 1998.
    • (1998) Informatics for Health and Social Care , vol.23 , Issue.4 , pp. 309-324
    • Gritzalis, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.