Proceedings of the 2004 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications 2004
DOI: 10.1145/1015467.1015489
|View full text |Cite
|
Sign up to set email alerts
|

Shield

Abstract: Software patching has not been effective as a first-line defense against large-scale worm attacks, even when patches have long been available for their corresponding vulnerabilities. Generally, people have been reluctant to patch their systems immediately, because patches are perceived to be unreliable and disruptive to apply. To address this problem, we propose a first-line worm defense in the network stack, using shields -vulnerability-specific, exploit-generic network filters installed in end systems once a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2005
2005
2016
2016

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 147 publications
(2 citation statements)
references
References 20 publications
0
2
0
Order By: Relevance
“…In general, these techniques perform analysis of the application source code to generate a vulnerability-specific input filter that will detect inputs that could reach the specified vulnerability. Some proposals detect and drop such inputs [26], [34], [53], [57], while others convert malicious inputs into benign inputs [33], [46].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In general, these techniques perform analysis of the application source code to generate a vulnerability-specific input filter that will detect inputs that could reach the specified vulnerability. Some proposals detect and drop such inputs [26], [34], [53], [57], while others convert malicious inputs into benign inputs [33], [46].…”
Section: Related Workmentioning
confidence: 99%
“…In contrast, Talos works on arbitrary internal functions in an application, and thus must infer error paths and values since it does not assume they are specified. Shields [57] uses statically extracted information to generate network filters, which then drop the network packets that might potentially trigger a vulnerability. Finally, SOAP heuristically converts malicious inputs into benign inputs [33] so that an application can still return partial (though sometimes inconsistent) results.…”
Section: Related Workmentioning
confidence: 99%