메뉴 건너뛰기




Volumn 2516, Issue , 2002, Pages 274-291

Accurate buffer overflow detection via abstract payload execution

Author keywords

Buffer overflow exploit; Intrusion detecion; Network security

Indexed keywords

BUFFER STORAGE; CODES (SYMBOLS); COMPUTER CRIME; INTERNET; MERCURY (METAL); NETWORK SECURITY; PERSONAL COMPUTING;

EID: 84958963167     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-36084-0_15     Document Type: Conference Paper
Times cited : (73)

References (25)
  • 1
    • 0006100649 scopus 로고    scopus 로고
    • Smashing the stack for fun and profit
    • AlephOne. Smashing the stack for fun and profit. Phrack Magazine, 49(14), 1996.
    • (1996) Phrack Magazine , vol.49 , Issue.14
  • 3
    • 84969383574 scopus 로고    scopus 로고
    • The Apache Software Foundation. http://www.apache.org.
  • 6
  • 7
    • 84969370200 scopus 로고    scopus 로고
    • Laurent Eschenauer. Imsafe. http://imsafe.sourceforge.net, 2001.
    • (2001) Imsafe
  • 9
    • 84969388341 scopus 로고    scopus 로고
    • The GNU Compiler Collection. http://gcc.gnu.org.
  • 10
    • 85084160308 scopus 로고    scopus 로고
    • A study in using neural networks for anomaly and misuse detection
    • A. Ghosh and A. Schwartzbard. A study in using neural networks for anomaly and misuse detection. In USENIX Security Symposium, 1999.
    • (1999) USENIX Security Symposium
    • Ghosh, A.1    Schwartzbard, A.2
  • 11
    • 0027593257 scopus 로고
    • NADIR: An automated system for detecting network intrusion and misuse
    • May
    • Judith Hochberg, Kathleen Jackson, Cathy Stallins, J. F. McClary, David DuBois, and Josephine Ford. NADIR: An automated system for detecting network intrusion and misuse. Computer and Security, 12(3):235–248, May 1993.
    • (1993) Computer and Security , vol.12 , Issue.3 , pp. 235-248
    • Hochberg, J.1    Jackson, K.2    Stallins, C.3    McClary, J.F.4    Dubois, D.5    Ford, J.6
  • 12
    • 84969372311 scopus 로고    scopus 로고
    • Intel. IA-32 Intel Architecture Software Developer’s Manual Volume 1-3, 2002. http://developer.intel.com/design/Pentium4/manuals/.
    • (2002) , vol.1-3
  • 13
    • 84969405499 scopus 로고    scopus 로고
    • Home of K2. http://www.ktwo.ca.
  • 14
    • 0036038437 scopus 로고    scopus 로고
    • Service Specific Anomaly Detection for Network Intrusion Detection
    • ACM Scientific Press, March
    • Christopher Kruegel, Thomas Toth, and Clemens Kerer. Service Specific Anomaly Detection for Network Intrusion Detection. In Symposium on Applied Computing (SAC). ACM Scientific Press, March 2002.
    • Symposium on Applied Computing (SAC) , pp. 2002
    • Kruegel, C.1    Toth, T.2    Kerer, C.3
  • 18
    • 1642293015 scopus 로고    scopus 로고
    • Snort - Lightweight Intrusion Detection for Networks
    • Martin Roesch. Snort - Lightweight Intrusion Detection for Networks. In USENIX Lisa 99, 1999.
    • (1999) USENIX Lisa 99
    • Roesch, M.1
  • 19
    • 84969370213 scopus 로고    scopus 로고
    • SecurityFocus Corporate Site. http://www.securityfocus.com.
  • 24
    • 0002067431 scopus 로고    scopus 로고
    • NetSTAT: A Network-based Intrusion Detection System
    • Giovanni Vigna and Richard A. Kemmerer. NetSTAT: A Network-based Intrusion Detection System. Journal of Computer Security, 7(1):37–71, 1999.
    • (1999) Journal of Computer Security , vol.7 , Issue.1 , pp. 37-71
    • Vigna, G.1    Richard, A.K.2
  • 25
    • 84969387551 scopus 로고    scopus 로고
    • WebSTONE - Mindcraft Corporate Site. http://www.mindcraft.com.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.