Discovering Application-Level Insider Attacks Using Symbolic Execution
暂无分享,去创建一个
[1] Cynthia A. Phillips,et al. A graph-based system for network-vulnerability analysis , 1998, NSPW '98.
[2] Theo Dimitrakos,et al. Formal Aspects in Security and Trust, Fourth International Workshop, FAST 2006, Hamilton, Ontario, Canada, August 26-27, 2006, Revised Selected Papers , 2007, Formal Aspects in Security and Trust.
[3] Flemming Nielson,et al. Where Can an Insider Attack? , 2006, Formal Aspects in Security and Trust.
[4] Duminda Wijesekera,et al. Scalable, graph-based network vulnerability analysis , 2002, CCS '02.
[5] Ravishankar K. Iyer,et al. An experimental study of security vulnerabilities caused by errors , 2001, 2001 International Conference on Dependable Systems and Networks.
[6] Andrew W. Appel,et al. Using memory errors to attack a virtual machine , 2003, 2003 Symposium on Security and Privacy, 2003..
[7] D. Wagner,et al. Catchconv : Symbolic execution and run-time type inference for integer conversion errors , 2007 .
[8] Dawn M. Cappelli,et al. Insider Threat Study: Illicit Cyber Activity in the Banking and Finance Sector , 2005 .
[9] Dawson R. Engler,et al. EXE: automatically generating inputs of death , 2006, CCS '06.
[10] James C. King,et al. Symbolic execution and program testing , 1976, CACM.
[11] Somesh Jha,et al. Automated generation and analysis of attack graphs , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[12] Walter Fumy,et al. Advances in Cryptology — EUROCRYPT ’97 , 2001, Lecture Notes in Computer Science.
[13] Narciso Martí-Oliet,et al. The Maude 2.0 System , 2003, RTA.
[14] Christopher Krügel,et al. Automating Mimicry Attacks Using Static Binary Analysis , 2005, USENIX Security Symposium.
[15] Ravishankar K. Iyer,et al. SymPLFIED: Symbolic program-level fault injection and error detection framework , 2008, 2008 IEEE International Conference on Dependable Systems and Networks With FTCS and DCC (DSN).
[16] Dawn M. Cappelli,et al. Insider Threat Study: Computer System Sabotage in Critical Infrastructure Sectors , 2005 .
[17] Takeo Kanade,et al. Formal Aspects in Security and Trust , 2008, Lecture Notes in Computer Science.
[18] Michael Wiener,et al. Advances in Cryptology — CRYPTO’ 99 , 1999 .
[19] Hung Q. Ngo,et al. Towards a theory of insider threat assessment , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).
[20] Richard J. Lipton,et al. On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract) , 1997, EUROCRYPT.
[21] Paul C. Kocher,et al. Differential Power Analysis , 1999, CRYPTO.
[22] Manuel Costa,et al. Bouncer: securing software by blocking bad input , 2008, WRAITS '08.