메뉴 건너뛰기




Volumn 40, Issue 4, 2006, Pages 15-27

Argos: An Emulator for Fingerprinting Zero-Day Attacks for advertised honeypots with automatic signature generation

Author keywords

[No Author keywords available]

Indexed keywords

INTRUSION DETECTION;

EID: 85101182647     PISSN: 01635980     EISSN: None     Source Type: Journal    
DOI: 10.1145/1218063.1217938     Document Type: Article
Times cited : (36)

References (43)
  • 2
    • 85101086840 scopus 로고    scopus 로고
    • Basic Architecture volume 1 of Intel Architecture Software Developer?s Manual
    • Basic Architecture, volume 1 of Intel Architecture Software Developer?s Manual. Intel Corporation, 1997.
    • (1997) Intel Corporation
  • 3
    • 0006100649 scopus 로고    scopus 로고
    • Smashing the stack for fun and profit
    • November
    • Aleph One. Smashing the stack for fun and profit. Phrack Magazine, 7(49), November 1996.
    • (1996) Phrack Magazine , vol.7 , pp. 49
    • One, A.1
  • 7
    • 17644393012 scopus 로고    scopus 로고
    • Bypassing Stackguard and Stackshield
    • January
    • Bulba Kir. Bypassing Stackguard and Stackshield. Phrack Magazine, 10(56), January 2000.
    • (2000) Phrack Magazine , vol.10 , pp. 56
    • Kir, B.1
  • 17
    • 12344330740 scopus 로고    scopus 로고
    • Secure program execution via dynamic information flow tracking
    • December SESSION: Security
    • G. E. Suh, J. W. Lee, D. Zhang and S. Devadas. Secure program execution via dynamic information flow tracking. ACM SIGOPS Operating Systems Review, 38(5):86-96, December 2004. SESSION: Security.
    • (2004) Acm Sigops Operating Systems Review , vol.38 , Issue.5 , pp. 86-96
    • Suh, G.E.1    Lee, J.W.2    Zhang, D.3    Devadas, S.4
  • 21
    • 34748842480 scopus 로고    scopus 로고
    • Advances in format string exploitation
    • July
    • gera and riq. Advances in format string exploitation. Phrack Magazine, 11(59), July 2002.
    • (2002) Phrack Magazine , vol.11 , pp. 59
    • Riq, G.1
  • 34
    • 85101136751 scopus 로고    scopus 로고
    • Smashing C++ VPTRS
    • rix January
    • rix. Smashing C++ VPTRS. Phrack Magazine, 10(56), January 2000.
    • (2000) Phrack Magazine , vol.10 , pp. 56
  • 36
    • 84862209017 scopus 로고    scopus 로고
    • Address obfuscation: An efficient approach to combat a broad range of memory error exploits
    • August
    • S. Bhatkar, D.C. Du Varney and R. Sekar. Address obfuscation: An efficient approach to combat a broad range of memory error exploits. In In Proc. of the 12th USENIX Security Symposium, pages 105-120, August 2003.
    • (2003) Proc. Of the 12th Usenix Security Symposium , pp. 105-120
    • Bhatkar, S.1    Du Varney, D.C.2    Sekar, R.3
  • 39
    • 34748831503 scopus 로고    scopus 로고
    • Win32 buffer overows (location, exploitation, and prevention)
    • D. Spyrit. Win32 buffer overows (location, exploitation, and prevention). Phrack 55, 1999.
    • (1999) Phrack , vol.55
    • Spyrit, D.1
  • 43
    • 84948951525 scopus 로고    scopus 로고
    • Throttling Viruses: Restricting Propagation to Defeat Malicious Mobile Code
    • Las Vegas, Nevada
    • M. M. Williamson. Throttling Viruses: Restricting Propagation to Defeat Malicious Mobile Code. In Proc. of ACSAC Security Conference, Las Vegas, Nevada, 2002.
    • (2002) Proc. Of Acsac Security Conference
    • Williamson, M.M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.