메뉴 건너뛰기




Volumn 2014-November, Issue November, 2014, Pages 41-50

On the challenges of effective movement

Author keywords

Cybersecurity challenges; Diversity; Metrics; Moving target; Randomization

Indexed keywords

DATA PRIVACY; SECURITY OF DATA;

EID: 84937705020     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2663474.2663480     Document Type: Conference Paper
Times cited : (32)

References (30)
  • 1
    • 84882582017 scopus 로고    scopus 로고
    • An inside look at botnets
    • M. Christodorescu, S. Jha, D. Maughan, D. Song, and C. Wang, editors, volume 27 of Advances in Information Security, Springer US
    • P. Barford and V. Yegneswaran. An inside look at botnets. In M. Christodorescu, S. Jha, D. Maughan, D. Song, and C. Wang, editors, Malware Detection, volume 27 of Advances in Information Security, pages 171-191. Springer US, 2007.
    • (2007) Malware Detection , pp. 171-191
    • Barford, P.1    Yegneswaran, V.2
  • 11
    • 39049113465 scopus 로고    scopus 로고
    • Address space layout permutation (aslp): Towards fine-grained randomization of commodity software
    • Ieee
    • C. Kil, J. Jun, C. Bookholt, J. Xu, and P. Ning. Address space layout permutation (aslp): Towards fine-grained randomization of commodity software. In Proc. of ACSAC'06, pages 339-348. Ieee, 2006.
    • (2006) Proc. of ACSAC'06 , pp. 339-348
    • Kil, C.1    Jun, J.2    Bookholt, C.3    Xu, J.4    Ning, P.5
  • 17
    • 3042642332 scopus 로고    scopus 로고
    • The advanced return-into-lib(c) exploits (pax case study)
    • Dec
    • Nergal. The advanced return-into-lib(c) exploits (pax case study). Phrack Magazine, 58(4):54, Dec 2001.
    • (2001) Phrack Magazine , vol.58 , Issue.4 , pp. 54
    • Nergal1
  • 23
    • 84910683130 scopus 로고    scopus 로고
    • Information leaks without memory disclosures: Remote side channel attacks on diversified code
    • J. Seibert, H. Okhravi, and E. Soderstrom. Information leaks without memory disclosures: Remote side channel attacks on diversified code. In Proc. of the 21st ACM CCS, 2014.
    • (2014) Proc. of the 21st ACM CCS
    • Seibert, J.1    Okhravi, H.2    Soderstrom, E.3
  • 25
    • 77952351839 scopus 로고    scopus 로고
    • The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86)
    • H. Shacham. The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86). In Proc. of ACM CCS, pages 552-561, 2007.
    • (2007) Proc. of ACM CCS , pp. 552-561
    • Shacham, H.1
  • 27
    • 84906818067 scopus 로고    scopus 로고
    • Where's the feeb? the effectiveness of instruction set randomization
    • A. N. Sovarel, D. Evans, and N. Paul. Where's the feeb? the effectiveness of instruction set randomization. In 14th USENIX Security Symposium, volume 6, 2005.
    • (2005) 14th USENIX Security Symposium , vol.6
    • Sovarel, A.N.1    Evans, D.2    Paul, N.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.