Buttercup: on network-based detection of polymorphic buffer overflow vulnerabilities
暂无分享,去创建一个
Karl N. Levitt | Shyhtsun Felix Wu | S. H. Li | S. F. Wu | Archana Pasupulati | Jason Coit | J. C. Kuo | K. P. Fan | K. Levitt | Archana Pasupulati | Jason Coit | S. Li | J. Kuo | K. Fan
[1] Ina Ruck,et al. USA , 1969, The Lancet.
[2] A. One,et al. Smashing The Stack For Fun And Profit , 1996 .
[3] Danilo Bruschi,et al. A Tool for Pro-active Defense Against the Buffer Overrun Attack , 1998, ESORICS.
[4] Crispan Cowan,et al. StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks , 1998, USENIX Security Symposium.
[5] Martin Roesch,et al. Snort - Lightweight Intrusion Detection for Networks , 1999 .
[6] David A. Wagner,et al. A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities , 2000, NDSS.
[7] Tzi-cker Chiueh,et al. RAD: a compile-time solution to buffer overflow attacks , 2001, Proceedings 21st International Conference on Distributed Computing Systems.
[8] Eric Chien,et al. BLENDED ATTACKS EXPLOITS, VULNERABILITIES AND BUFFER-OVERFLOW TECHNIQUES IN COMPUTER VIRUSES , 2002 .
[9] Christopher Krügel,et al. Accurate Buffer Overflow Detection via Abstract Payload Execution , 2002, RAID.