메뉴 건너뛰기




Volumn 12, Issue 1, 2014, Pages 83-87

Beyond planted bugs in 'trusting trust': The input-processing frontier

Author keywords

big data; CSA; intrusion detection system; SIEM

Indexed keywords

ELECTRICAL ENGINEERING;

EID: 84898417979     PISSN: 15407993     EISSN: None     Source Type: Journal    
DOI: 10.1109/MSP.2014.1     Document Type: Article
Times cited : (13)

References (9)
  • 1
    • 84976781807 scopus 로고
    • Reflections on trusting trust
    • K. Thompson, "Reflections on Trusting Trust," Comm. ACM, vol. 8, no. 27, 1984, pp. 761-763.
    • (1984) Comm. ACM , vol.8 , Issue.27 , pp. 761-763
    • Thompson, K.1
  • 2
    • 84898437431 scopus 로고    scopus 로고
    • A Tale of Two Pwnies (Part 1) 22 May
    • "A Tale of Two Pwnies (Part 1)," Chromium blog, 22 May 2012; ht tp://blog.chromium.org/2012/05/tale-of-two-pwnies-part-1.html.
    • (2012) Chromium Blog
  • 3
    • 85084161804 scopus 로고    scopus 로고
    • Exploiting the hard-working DWARF: Trojan and exploit techniques with no native executable code
    • J. Oakley and S. Bratus, "Exploiting the Hard-Working DWARF: Trojan and Exploit Techniques with No Native Executable Code," Proc. 5th Usenix Conf. Offensive Technologies, Usenix, 2011; https://www. usenix.org/event/ woot11/tech/final-files/Oakley.pdf.
    • (2011) Proc. 5th Usenix Conf. Offensive Technologies, Usenix
    • Oakley, J.1    Bratus, S.2
  • 4
    • 85084161911 scopus 로고    scopus 로고
    • Weird machines' in ELF: A spotlight on the underappreciated metadata
    • R. Shapiro, S. Bratus, and S.W. Smith, "'Weird Machines' in ELF: A Spotlight on the Underappreciated Metadata," Proc. 7th Usenix Conf. Offensive Technologies, Usenix, 2013; https://www. usenix.org/conference/woot13/ workshop-program/presentation/Shapiro.
    • (2013) Proc. 7th Usenix Conf. Offensive Technologies, Usenix
    • Shapiro, R.1    Bratus, S.2    Smith, S.W.3
  • 7
    • 84987632536 scopus 로고    scopus 로고
    • The page-fault weird machine: Lessons in instruction-less computation
    • J. Bangert et al., "The Page-Fault Weird Machine: Lessons in Instruction-Less Computation," Proc. 7th Usenix Conf. Offensive Technologies, Usenix, 2013; https://www.usenix.org/conference/woot13/wo r k shop-p rog r am/presentation/Bangert.
    • (2013) Proc. 7th Usenix Conf. Offensive Technologies, Usenix
    • Bangert, J.1
  • 8
    • 85084160972 scopus 로고    scopus 로고
    • Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics
    • M. Handley, V. Paxson, and C. Kriebich, "Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics," Proc. 10th Conf. Usenix Security Symp., vol. 10, 2001; https://www.usenix.org/conference/10th-usenix-security-symposium/n e t wo r k-i n t r u s i o n-detection-evasion-traffic-normalization.
    • (2001) Proc. 10th Conf. Usenix Security Symp. , vol.10
    • Handley, M.1    Paxson, V.2    Kriebich, C.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.