메뉴 건너뛰기




Volumn , Issue , 2002, Pages

Detecting manipulated remote call streams

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER AIDED SOFTWARE ENGINEERING; EFFICIENCY;

EID: 85084162795     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (106)

References (40)
  • 3
    • 1142294722 scopus 로고
    • Standard ML of New Jersey
    • Passau, Germany, August 1991. Also J. Maluszynski and M. Wirsing, eds., Programming Language Implementation and Logic Programming, Lecture Notes in Computer Science #528,. Springer-Verlag, New York
    • A.W. Appel and D.B. MacQueen, “Standard ML of New Jersey”, Third International Symposium on Programming Language Implementation and Logic Programming, Passau, Germany, August 1991. Also appears in J. Maluszynski and M. Wirsing, eds., Programming Language Implementation and Logic Programming, Lecture Notes in Computer Science #528, pp. 1-13, Springer-Verlag, New York (1991).
    • (1991) Third International Symposium on Programming Language Implementation and Logic Programming , pp. 1-13
    • Appel, A.W.1    MacQueen, D.B.2
  • 5
    • 79251578513 scopus 로고    scopus 로고
    • On the (im)possibility of obfuscating programs
    • Santa Barbara, California, August 2001. Also J. Kilian, ed., Advances in Cryptology CRYPTO 2001, Lecture Notes in Computer Science #2139,. Springer-Verlag, New York
    • B. Barak, O. Goldreich, R. Impagaliazzo, S. Rudich, A. Sahai, S. Vadhan, and K. Yang, “On the (Im)possibility of Obfuscating Programs”, 21st Annual International Cryptography Conference, Santa Barbara, California, August 2001. Also appears in J. Kilian, ed., Advances in Cryptology - CRYPTO 2001, Lecture Notes in Computer Science #2139, pp. 1-18, Springer-Verlag, New York (2001).
    • (2001) 21st Annual International Cryptography Conference , pp. 1-18
    • Barak, B.1    Goldreich, O.2    Impagaliazzo, R.3    Rudich, S.4    Sahai, A.5    Vadhan, S.6    Yang, K.7
  • 7
    • 33845391963 scopus 로고    scopus 로고
    • An approach to the obfuscation of control-flow of sequential computer programs
    • Malaga, Spain, October
    • S. Chow, Y. Gu, H. Johnson, and V.A. Zakharov, “An Approach to the Obfuscation of Control-Flow of Sequential Computer Programs”, Information Security Conference ‘01, Malaga, Spain, October 2001.
    • (2001) Information Security Conference ‘01
    • Chow, S.1    Gu, Y.2    Johnson, H.3    Zakharov, V.A.4
  • 12
    • 84900295726 scopus 로고    scopus 로고
    • Scalable networked information processing environment (SNIPE)
    • San Jose, California, November
    • G.E. Fagg, K. Moore, and J.J. Dongarra, “Scalable Networked Information Processing Environment (SNIPE)”, Supercomputing ‘97, San Jose, California, November 1997.
    • (1997) Supercomputing ‘97
    • Fagg, G.E.1    Moore, K.2    Dongarra, J.J.3
  • 19
    • 0002197352 scopus 로고
    • An n log n algorithm for minimizing states in a finite automaton
    • Academic Press, New York
    • J. Hopcroft, An n log n Algorithm for Minimizing States in a Finite Automaton, Theory of Machines and Computations, pp. 189-196, Academic Press, New York (1971).
    • (1971) Theory of Machines and Computations , pp. 189-196
    • Hopcroft, J.1
  • 23
    • 0028714365 scopus 로고
    • Automated detection of vulnerabilities in privileged programs by execution monitoring
    • Orlando, Florida
    • C. Ko, G. Fink, and K. Levitt, “Automated Detection of Vulnerabilities in Privileged Programs by Execution Monitoring”, 10th Annual Computer Security Applications Conference, Orlando, Florida, 1994.
    • (1994) 10th Annual Computer Security Applications Conference
    • Ko, C.1    Fink, G.2    Levitt, K.3
  • 24
    • 0033726577 scopus 로고    scopus 로고
    • Logic induction of valid behavior specifications for intrusion detection
    • Oakland, California
    • C. Ko, “Logic Induction of Valid Behavior Specifications for Intrusion Detection”, 2000 IEEE Symposium on Security and Privacy, Oakland, California, 2000.
    • (2000) 2000 IEEE Symposium on Security and Privacy
    • Ko, C.1
  • 28
    • 0035354794 scopus 로고    scopus 로고
    • Playing inside the black box: Using dynamic instrumentation to create security holes
    • June/September Also the Second Los Alamos Computer Science Institute Symposium, Sante Fe, NM October 2001
    • B.P. Miller, M. Christodorescu, R. Iverson, T. Kosar, A. Mirgorodskii, and F. Popovici, “Playing Inside the Black Box: Using Dynamic Instrumentation to Create Security Holes”, Parallel Processing Letters 11, 2/3, pp. 267-280, June/September 2001. Also appears in the Second Los Alamos Computer Science Institute Symposium, Sante Fe, NM (October 2001).
    • (2001) Parallel Processing Letters , vol.11 , Issue.2-3 , pp. 267-280
    • Miller, B.P.1    Christodorescu, M.2    Iverson, R.3    Kosar, T.4    Mirgorodskii, A.5    Popovici, F.6
  • 29
    • 0032295876 scopus 로고    scopus 로고
    • Program analysis via graph reachability
    • November/December
    • T. Reps, “Program Analysis via Graph Reachability”, Information and Software Technology 40, 11/12, pp. 701-726, November/December 1998.
    • (1998) Information and Software Technology , vol.40 , Issue.11-12 , pp. 701-726
    • Reps, T.1
  • 30
    • 0016081584 scopus 로고
    • Protection and the control of information sharing in multics
    • July
    • J.H. Saltzer, “Protection and the Control of Information Sharing in Multics”, Communications of the ACM 17, 7, pp. 388-402, July 1974.
    • (1974) Communications of the ACM , vol.17 , Issue.7 , pp. 388-402
    • Saltzer, J.H.1
  • 34
    • 84889281740 scopus 로고    scopus 로고
    • 11 May
    • Sun Microsystems, Java Virtual Machines, 11 May 2002, http://java.sun.com/j2se/1.4/docs/guide/vm/.
    • (2002) Java Virtual Machines
  • 35
    • 0000990322 scopus 로고
    • A survey of program slicing techniques
    • September
    • F. Tip, “A Survey of Program Slicing Techniques”, Journal of Programming Languages 3, 3, pp.121-189, September 1995.
    • (1995) Journal of Programming Languages , vol.3 , Issue.3 , pp. 121-189
    • Tip, F.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.