Expert Assessment on the Probability of Successful Remote Code Execution Attacks
暂无分享,去创建一个
Mathias Ekstedt | Ulrik Franke | Teodor Sommestad | Hannes Holm | M. Ekstedt | U. Franke | Hannes Holm | T. Sommestad
[1] Susan Horwitz,et al. Protecting C programs from attacks via invalid pointer dereferences , 2003, ESEC/FSE-11.
[2] Michael Rodeh,et al. Cleanness Checking of String Manipulations in C Programs via Integer Analysis , 2001, SAS.
[3] Hovav Shacham,et al. On the effectiveness of address-space randomization , 2004, CCS '04.
[4] James Cheney,et al. Cyclone: A Safe Dialect of C , 2002, USENIX Annual Technical Conference, General Track.
[5] A. O'Hagan,et al. Statistical Methods for Eliciting Probability Distributions , 2005 .
[6] Calton Pu,et al. Buffer overflows: attacks and defenses for the vulnerability of the decade , 2000, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].
[7] Tzi-cker Chiueh,et al. Checking array bound violation using segmentation hardware , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).
[8] J. Homer. A Sound and Practical Approach to Quantifying Security Risk in Enterprise Networks ∗ , 2009 .
[9] John Wilander,et al. A Comparison of Publicly Available Tools for Dynamic Buffer Overflow Prevention , 2003, NDSS.
[10] Teodor Sommestad,et al. A quantitative evaluation of vulnerability scanning , 2011, Inf. Manag. Comput. Secur..
[11] Margaret J. Robertson,et al. Design and Analysis of Experiments , 2006, Handbook of statistics.
[12] Angelos D. Keromytis,et al. Countering code-injection attacks with instruction-set randomization , 2003, CCS '03.
[13] Simeon Xenitellis. Identifying security vulnerabilities through input flow tracing and analysis , 2003, Inf. Manag. Comput. Secur..
[14] James Newsome,et al. Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software , 2005, NDSS.
[15] A. One,et al. Smashing The Stack For Fun And Profit , 1996 .
[16] Kenneth Geers. Live Fire Exercise: Preparing for Cyber War , 2010 .
[17] Yves Younan,et al. Efficient Countermeasures for Software Vulnerabilities due to Memory Management Errors (Efficiënte tegenmaatregelen voor softwarekwetsbaarheden veroorzaakt door geheugenbeheerfouten) , 2008 .
[18] Crispin Cowan,et al. FormatGuard: Automatic Protection From printf Format String Vulnerabilities , 2001, USENIX Security Symposium.
[19] Mathias Ekstedt,et al. A probabilistic relational model for security risk analysis , 2010, Comput. Secur..
[20] Jonathan D. Pincus,et al. Beyond stack smashing: recent advances in exploiting buffer overruns , 2004, IEEE Security & Privacy Magazine.
[21] Karen A. Scarfone,et al. A Complete Guide to the Common Vulnerability Scoring System Version 2.0 | NIST , 2007 .
[22] Robert O. Hastings,et al. Fast detection of memory leaks and access errors , 1991 .
[23] R. Warner. Applied Statistics: From Bivariate through Multivariate Techniques [with CD-ROM]. , 2007 .
[24] Úlfar Erlingsson,et al. Low-Level Software Security: Attacks and Defenses , 2007, FOSAD.
[25] Navjot Singh,et al. Transparent Run-Time Defense Against Stack-Smashing Attacks , 2000, USENIX Annual Technical Conference, General Track.
[26] H. J. Einhorn. Expert judgment: Some necessary conditions and an example. , 1974 .