메뉴 건너뛰기




Volumn , Issue , 2010, Pages 257-272

Idle Port Scanning and Non-interference Analysis of Network Protocol Stacks Using Model Checking

Author keywords

[No Author keywords available]

Indexed keywords

MODEL CHECKING; SIDE CHANNEL ATTACK;

EID: 84906789612     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (46)

References (38)
  • 1
    • 84900594778 scopus 로고    scopus 로고
    • New TCP scan method
    • ANTIREZ. 18 December
    • ANTIREZ. new tcp scan method. Posted to the bugtraq mailing list, 18 December 1998.
    • (1998) Posted to the Bugtraq Mailing List
  • 5
    • 34247101917 scopus 로고    scopus 로고
    • From NuSMV to spin: Experiences with model checking (light guidance systems
    • CHOI, Y. From NuSMV to SPIN: Experiences with model checking (light guidance systems. Form. Methods Syst. Des. 30, 3 (2007), 199-216.
    • (2007) Form. Methods Syst. Des. , vol.30 , Issue.3 , pp. 199-216
    • Choi, Y.1
  • 6
    • 85076286396 scopus 로고    scopus 로고
    • note, Computer Science Laboratory, SRI International, Menlo Park, CA, Apr
    • DEMOURA, E. SAL tutorial. CSL technical note, Computer Science Laboratory, SRI International, Menlo Park, CA, Apr. 2004. Available at http://sal.csl.sri.com/doc/salenv_tutorial.pdf.
    • (2004) SAL Tutorial. CSL Technical
    • Demoura, E.1
  • 7
    • 0016543936 scopus 로고
    • Guarded commands, nondeterminacy and formal derivation of programs
    • DIJKSTRA, E. W. Guarded commands, nondeterminacy and formal derivation of programs. Commun. ACM 18, 8 (1975), 453¬ 457.
    • (1975) Commun. ACM , vol.18 , Issue.8 , pp. 453-457
    • Dijkstra, E.W.1
  • 16
    • 84976667065 scopus 로고
    • Shared resource matrix methodology: An approach to identifying storage and timing channels
    • KEMMERER, R. A. Shared resource matrix methodology: an approach to identifying storage and timing channels. ACM Trans. Compia. Syst. 1, 3 (1983), 256-277.
    • (1983) ACM Trans. Compia. Syst. , vol.1 , Issue.3 , pp. 256-277
    • Kemmerer, R.A.1
  • 20
    • 70350218435 scopus 로고    scopus 로고
    • NMAP network scanning: The official NMAP project guide to network discover,: The security scanning
    • 20 Org LLC, Sunnyvale, CA, USA
    • LYON, G . Nmap Network Scanning: The Official Nmap Project Guide to Network Discover,- and Security Scanning. Insecure.Org L L C, Sunnyvale, CA, USA, 2009.
    • (2009) Insecure
    • Lyon, G.1
  • 26
    • 33750100723 scopus 로고    scopus 로고
    • CSL technical note, Computer Science Laboratory, SRI International, Menlo Park, CA, Oct
    • RUSHBY, J. SAL tutorial: The Needham-Schroeder protocol in SAL. CSL technical note, Computer Science Laboratory, SRI International, Menlo Park, CA, Oct. 2003. Available at http://www.csl.sri.com/users/rushby/abstracts/needham03.
    • (2003) SAL Tutorial: The Needham-Schroeder Protocol in SAL
    • Rushby, J.1
  • 27
    • 77954584130 scopus 로고    scopus 로고
    • CSL technical note, Computer Science Laboratory, SRI International, Menlo Park, CA, Apr
    • RUSHBY, J. SAL tutorial: Analyzing the fault-tolerant algorithm OM(l). CSL technical note, Computer Science Laboratory, SRI International, Menlo Park, CA, Apr. 2004. Available at http://www.csl.sri.com/users/rushby/abstracts/oml.
    • (2004) SAL Tutorial: Analyzing the Fault-Tolerant Algorithm OM(L)
    • Rushby, J.1
  • 28
    • 85076319788 scopus 로고    scopus 로고
    • SAL PROJECT. Examples, http://sal.csl.sri.com/examples. shtml.
    • Examples
  • 32
    • 0036090327 scopus 로고    scopus 로고
    • Practical automated detection of stealthy portscans
    • STANIFORD, S., HOAGLAND, J.A ., A N D MCALERNEY, J . M . Practical automated detection of stealthy portscans. /. Compiti Secar. 10, 1-2 (2002), 105-136.
    • (2002) Compiti Secar , vol.10 , Issue.1-2 , pp. 105-136
    • Staniford, S.1    Hoagland, J.A.2    McAlerney, J.M.3
  • 34
    • 84872740465 scopus 로고    scopus 로고
    • VirtualBox. http://www.virtualbox.org/.
    • VirtualBox


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.