Zero Day Exploits

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

N-Version Programming for the Detection of Zero-day Exploits

Using N-Version programming techniques to increase software reliability is a well-explored field. In this paper, we extend the concept to the detection of new security vulnerabilities. Using our own N-Version arbiter, Judicare, we implement a simple auction web application, and demonstrate how our application is robust to the most common Web vulnerabilities as documented by OWASP. Finally, we d...

متن کامل

SGNET: a distributed infrastructure to handle zero-day exploits

This work builds upon the Leurré.com infrastructure and the Scriptgen technology. Leurré.com is a worldwide distributed setup of low interaction honeypots whereas Scriptgen is a new class of honeypot: a medium interaction one. In this paper, we see how Scriptgen can be enriched thanks to the Argos and Nepenthes open source software in order to build a distributed system able to collect rich inf...

متن کامل

Automated Forensic Techniques for Locating Zero-day Exploits

.............................................................................................................................. ii Acknowledgments: ............................................................................................................ iv List of tables: ...................................................................................................................... ix ...

متن کامل

Runtime Detection of Zero-Day Vulnerability Exploits in Contemporary Software Systems

It is argued that runtime verification techniques can be used to identify unknown application security vulnerabilities that are a consequence of unexpected execution paths in software. A methodology is proposed that can be used to build a model of expected application execution paths during the software development cycle. This model is used at runtime to detect exploitation of unknown security ...

متن کامل

Observation from Microsoft Zero-Day Vulnerability Examples

Zero-Day vulnerabilities are an intriguing and ever increasing problem. Microsoft has been one of the more exploited companies having Zero-Day vulnerabilities. This paper intends to identify some relationships within the ZeroDay vulnerabilities identified in nineteen news articles from 2010. We tried to collect data on vulnerability report date, attack report date, vulnerability patch date, vul...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Datenschutz und Datensicherheit - DuD

سال: 2009

ISSN: 1614-0702,1862-2607

DOI: 10.1007/s11623-009-0060-0