Zero Day Exploits
نویسندگان
چکیده
منابع مشابه
N-Version Programming for the Detection of Zero-day Exploits
Using N-Version programming techniques to increase software reliability is a well-explored field. In this paper, we extend the concept to the detection of new security vulnerabilities. Using our own N-Version arbiter, Judicare, we implement a simple auction web application, and demonstrate how our application is robust to the most common Web vulnerabilities as documented by OWASP. Finally, we d...
متن کاملSGNET: a distributed infrastructure to handle zero-day exploits
This work builds upon the Leurré.com infrastructure and the Scriptgen technology. Leurré.com is a worldwide distributed setup of low interaction honeypots whereas Scriptgen is a new class of honeypot: a medium interaction one. In this paper, we see how Scriptgen can be enriched thanks to the Argos and Nepenthes open source software in order to build a distributed system able to collect rich inf...
متن کاملAutomated Forensic Techniques for Locating Zero-day Exploits
.............................................................................................................................. ii Acknowledgments: ............................................................................................................ iv List of tables: ...................................................................................................................... ix ...
متن کاملRuntime Detection of Zero-Day Vulnerability Exploits in Contemporary Software Systems
It is argued that runtime verification techniques can be used to identify unknown application security vulnerabilities that are a consequence of unexpected execution paths in software. A methodology is proposed that can be used to build a model of expected application execution paths during the software development cycle. This model is used at runtime to detect exploitation of unknown security ...
متن کاملObservation from Microsoft Zero-Day Vulnerability Examples
Zero-Day vulnerabilities are an intriguing and ever increasing problem. Microsoft has been one of the more exploited companies having Zero-Day vulnerabilities. This paper intends to identify some relationships within the ZeroDay vulnerabilities identified in nineteen news articles from 2010. We tried to collect data on vulnerability report date, attack report date, vulnerability patch date, vul...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Datenschutz und Datensicherheit - DuD
سال: 2009
ISSN: 1614-0702,1862-2607
DOI: 10.1007/s11623-009-0060-0