메뉴 건너뛰기




Volumn , Issue , 2011, Pages

Vulnerability extrapolation: Assisted discovery of vulnerabilities using machine learning

Author keywords

[No Author keywords available]

Indexed keywords

APPLICATION PROGRAMMING INTERFACES (API); EXTRAPOLATION; SOFTWARE TESTING; VECTOR SPACES;

EID: 85084163318     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (170)

References (38)
  • 2
    • 85080608692 scopus 로고    scopus 로고
    • visited April
    • Rough auditing tool for security. Fortify Software Inc., https://www.fortify.com/ssa-elements/threat-intelligence/rats.html, visited April, 2011.
    • (2011) Rough Auditing Tool for Security
  • 13
    • 36949007362 scopus 로고    scopus 로고
    • Challenging the anomaly detection paradigm: A provocative discussion
    • C. Gates and C. Taylor. Challenging the anomaly detection paradigm: A provocative discussion. In Proc. of New Security Paradigms Workshop (NSPW), pages 21–29, 2006.
    • (2006) Proc. of New Security Paradigms Workshop (NSPW) , pp. 21-29
    • Gates, C.1    Taylor, C.2
  • 16
    • 32344452883 scopus 로고    scopus 로고
    • PR-Miner: Automatically extracting implicit programming rules and detecting violations in large software code
    • Z. Li and Y. Zhou. PR-Miner: automatically extracting implicit programming rules and detecting violations in large software code. In Proc. of European Software Engineering Conference (ESEC), pages 306–315, 2005.
    • (2005) Proc. of European Software Engineering Conference (ESEC) , pp. 306-315
    • Li, Z.1    Zhou, Y.2
  • 18
    • 84923564816 scopus 로고    scopus 로고
    • Finding security vulnerabilities in java applications with static analysis
    • V. B. Livshits and M. S. Lam. Finding security vulnerabilities in java applications with static analysis. In Proc. of USENIX Security Symposium, 2005.
    • (2005) Proc. of USENIX Security Symposium
    • Livshits, V.B.1    Lam, M.S.2
  • 20
    • 79953672829 scopus 로고    scopus 로고
    • Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
    • J. Newsome and D. Song. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In Proc. of Network and Distributed System Security Symposium (NDSS), 2005.
    • (2005) Proc. of Network and Distributed System Security Symposium (NDSS)
    • Newsome, J.1    Song, D.2
  • 23
    • 60649088451 scopus 로고    scopus 로고
    • McBoost: Boosting scalability in malware collection and analysis using statistical classification of executables
    • R. Perdisci, A. Lanzi, and W. Lee. McBoost: Boosting scalability in malware collection and analysis using statistical classification of executables. In Proc. of Annual Computer Security Applications Conference (ACSAC), pages 301–310, 2008.
    • (2008) Proc. of Annual Computer Security Applications Conference (ACSAC) , pp. 301-310
    • Perdisci, R.1    Lanzi, A.2    Lee, W.3
  • 25
    • 38949156579 scopus 로고    scopus 로고
    • Linear-time computation of similarity measures for sequential data
    • K. Rieck and P. Laskov. Linear-time computation of similarity measures for sequential data. Journal of Machine Learning Research, 9(Jan):23–48, 2008.
    • (2008) Journal of Machine Learning Research , vol.9 , Issue.Jan , pp. 23-48
    • Rieck, K.1    Laskov, P.2
  • 28
    • 0016572913 scopus 로고
    • A vector space model for automatic indexing
    • G. Salton, A. Wong, and C. Yang. A vector space model for automatic indexing. Communications of the ACM, 18(11):613–620, 1975.
    • (1975) Communications of the ACM , vol.18 , Issue.11 , pp. 613-620
    • Salton, G.1    Wong, A.2    Yang, C.3
  • 29
    • 77955182005 scopus 로고    scopus 로고
    • All you ever wanted to know about dynamic taint analysis and forward symbolic execution (but might have been afraid to ask)
    • E. Schwartz, T. Avgerinos, and D. Brumley. All you ever wanted to know about dynamic taint analysis and forward symbolic execution (but might have been afraid to ask). In Proc. of IEEE Symposium on Security and Privacy, pages 317–331, 2010.
    • (2010) Proc. of IEEE Symposium on Security and Privacy , pp. 317-331
    • Schwartz, E.1    Avgerinos, T.2    Brumley, D.3
  • 30
    • 77955209381 scopus 로고    scopus 로고
    • Outside the closed world: On using machine learning for network intrusion detection
    • R. Sommer and V. Paxson. Outside the closed world: On using machine learning for network intrusion detection. In Proc. of IEEE Symposium on Security and Privacy, pages 305–316, 2010.
    • (2010) Proc. of IEEE Symposium on Security and Privacy , pp. 305-316
    • Sommer, R.1    Paxson, V.2
  • 31
    • 83755209149 scopus 로고    scopus 로고
    • On the infeasibility of modeling polymorphic shellcode: Re-thinking the role of learning in intrusion detection systems
    • Y. Song, M. Locasto, A. Stavrou, A. D. Keromytis, and S. J. Stolfo. On the infeasibility of modeling polymorphic shellcode: Re-thinking the role of learning in intrusion detection systems. Machine Learning, 2009.
    • (2009) Machine Learning
    • Song, Y.1    Locasto, M.2    Stavrou, A.3    Keromytis, A.D.4    Stolfo, S.J.5
  • 35
    • 84911945054 scopus 로고    scopus 로고
    • visited April
    • D. A. Wheeler. Flawfinder. http://www.dwheeler.com/flawfinder/, visited April, 2011.
    • (2011) Flawfinder
    • Wheeler, D.A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.