2006
DOI: 10.1109/jproc.2005.862473
|View full text |Cite
|
Sign up to set email alerts
|

Security Vulnerabilities: From Analysis to Detection and Masking Techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2008
2008
2021
2021

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 16 publications
(5 citation statements)
references
References 16 publications
0
5
0
Order By: Relevance
“…What is more, the above re-searches did not consider source codes and hence did not provide enough information for mitigation strategies. Chen et al [2] explored code-level modeling. They applied data-driven finite state machine to analyze vulnerabilities.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…What is more, the above re-searches did not consider source codes and hence did not provide enough information for mitigation strategies. Chen et al [2] explored code-level modeling. They applied data-driven finite state machine to analyze vulnerabilities.…”
Section: Related Workmentioning
confidence: 99%
“…The basic elevated penetration attack model is used to describe every step of attack pattern. Consequently, we can acquire FSM model of attack patterns by combining every basic FSM [2]. In this section, our models describe escape process conceptually with condition and action represented by Datalog based language in FSM.…”
Section: Datalog-based Formal Languagementioning
confidence: 99%
See 1 more Smart Citation
“…Address Space Layout Randomization (ASLR) negates characteristics, mod:radd, mod:fptr, mod:cvar, and cptr by randomizing the locations at which those variables are stored [37], [38], [39], [40]. ASLR also has been applied to rearrange code, which negates jmp:stack and jmp:heap.…”
Section: Other Defensesmentioning
confidence: 99%
“…In this model, audit records, network packets, or any other observable service activities are utilized for detecting abnormalities. Vulnerability assessments (VAs) [12][13][14] involve discovering system vulnerability before an attack takes place. Generally, system vulnerabilities can be classifi ed into the following categories: vendor-supplied software, administration, and user activity [15].…”
Section: Introductionmentioning
confidence: 99%