메뉴 건너뛰기




Volumn , Issue , 2006, Pages 225-240

SigFree: A signature-free buffer overflow attack blocker

Author keywords

[No Author keywords available]

Indexed keywords

BUFFER STORAGE; CODES (SYMBOLS);

EID: 85027555608     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (62)

References (55)
  • 8
    • 76949094440 scopus 로고    scopus 로고
    • Winamp3 buffer overflow. http://www.securityspace.com/ smysecure/catid.html?id=11530.
    • Winamp3 Buffer Overflow
  • 9
    • 76949088597 scopus 로고    scopus 로고
    • November
    • Pax documentation. http://pax.grsecurity.net/docs/pax.txt, November 2003.
    • (2003) Pax Documentation
  • 13
    • 84954188728 scopus 로고    scopus 로고
    • Efficient techniques for comprehensive protection from memory error exploits
    • BHATKAR, S., SEKAR, R., AND DUVARNEY, D. C. Efficient techniques for comprehensive protection from memory error exploits. In USENIX Security (2005).
    • (2005) USENIX Security
    • Bhatkar, S.1    Sekar, R.2    Duvarney, D.C.3
  • 14
    • 25644452721 scopus 로고    scopus 로고
    • Model checking one million lines of c code
    • CHEN, H., DEAN, D., AND WAGNER, D. Model checking one million lines of c code. In NDSS (2004).
    • (2004) NDSS
    • Chen, H.1    Dean, D.2    Wagner, D.3
  • 15
    • 33746405183 scopus 로고    scopus 로고
    • A fast static analysis approach to detect exploit code inside network flows
    • CHINCHANI, R., AND BERG, E. V. D. A fast static analysis approach to detect exploit code inside network flows. In RAID (2005).
    • (2005) RAID
    • Chinchani, R.1    Berg, E.V.D.2
  • 18
    • 0035017559 scopus 로고    scopus 로고
    • RAD: A compile-time solution to buffer overflow attacks
    • CKER CHIUEH, T., AND HSU, F.-H. Rad: A compile-time solution to buffer overflow attacks. In ICDCS (2001).
    • (2001) ICDCS
    • Cker Chiueh, T.1    Hsu, F.-H.2
  • 24
    • 0036147522 scopus 로고    scopus 로고
    • Improving security using extensible lightweight static analysis
    • EVANS, D., AND LAROCHELLE, D. Improving security using extensible lightweight static analysis. IEEE Software 19, 1 (2002).
    • (2002) IEEE Software , vol.19 , pp. 1
    • Evans, D.1    Larochelle, D.2
  • 25
    • 0016996537 scopus 로고
    • Data flow analysis in software reliability
    • September
    • FOSDICK, L. D., AND OSTERWEIL, L. Data flow analysis in software reliability. ACM Computing Surveys 8 (September 1976).
    • (1976) ACM Computing Surveys , vol.8
    • Fosdick, L.D.1    Osterweil, L.2
  • 26
    • 0018467375 scopus 로고
    • Detection of data flow anomaly through program instrumentation
    • May
    • HUANG, J. Detection of data flow anomaly through program instrumentation. IEEE Transactions on Software Engineering 5, 3 (May 1979).
    • (1979) IEEE Transactions on Software Engineering , vol.5 , pp. 3
    • Huang, J.1
  • 32
    • 33746389292 scopus 로고    scopus 로고
    • Polymorphic worm detection using structural information of executables
    • KRUEGEL, C., KIRDA, E., MUTZ, D., ROBERTSON, W., AND VIGNA, G. Polymorphic worm detection using structural information of executables. In RAID (2005).
    • (2005) RAID
    • Kruegel, C.1    Kirda, E.2    Mutz, D.3    Robertson, W.4    Vigna, G.5
  • 43
    • 79953672829 scopus 로고    scopus 로고
    • Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
    • NEWSOME, J., AND SONG, D. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In NDSS (2005).
    • (2005) NDSS
    • Newsome, J.1    Song, D.2
  • 49
    • 33845453072 scopus 로고    scopus 로고
    • Dira: Automatic detection, identification, and repair of control-hijacking attacks
    • SMIRNOV, A., AND CKER CHIUEH, T. Dira: Automatic detection, identification, and repair of control-hijacking attacks. In NDSS (2005).
    • (2005) NDSS
    • Smirnov, A.1    Cker Chiueh, T.2
  • 50
    • 1642268792 scopus 로고    scopus 로고
    • Accurate buffer overflow detection via abstract payload execution
    • TOTH, T., AND KRUEGEL, C. Accurate buffer overflow detection via abstract payload execution. In RAID (2002).
    • (2002) RAID
    • Toth, T.1    Kruegel, C.2
  • 53
    • 33750351545 scopus 로고    scopus 로고
    • Anomalous payload-based worm detection and signature generation
    • WANG, K.,, CRETU, G., AND STOLFO, S. J. Anomalous payload-based worm detection and signature generation. In RAID (2005).
    • (2005) RAID
    • Wang, K.1    Cretu, G.2    Stolfo, S.J.3
  • 54
    • 30344438592 scopus 로고    scopus 로고
    • Anomalous payload-based network instrusion detection
    • WANG, K., AND STOLFO, S. J. Anomalous payload-based network instrusion detection. In RAID (2004).
    • (2004) RAID
    • Wang, K.1    Stolfo, S.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.