Article citationsMore>>
Schwartz, E.J., Avgerinos, T. and Brumley, D. (2010) All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but Might Have Been Afraid to Ask). Proceedings of the 2010 IEEE Symposium on Security and Privacy, Oakland, 16-19 May 2010, 317-331.
http://dx.doi.org/10.1109/SP.2010.26
has been cited by the following article:
-
TITLE:
Detection of Sophisticated Network Enabled Threats via a Novel Micro-Proxy Architecture
AUTHORS:
Andrew Blyth
KEYWORDS:
Network Security; Firewalls; Proxies and Intrusion Detection
JOURNAL NAME:
Journal of Information Security,
Vol.5 No.2,
March
12,
2014
ABSTRACT:
With the increasing use of novel exploitation
techniques in modern malicious software it can be argued that current intrusion
detection and intrusion prevention systems are failing to keep pace. While some
intrusion prevention systems have the capability to detect evasion techniques
they all fail to detect novel unknown exploitation techniques. Traditional
proxy approaches have failed to protect the universe of discourse that a
network enabled service can be engaged in as they view all information flows of
the same type in a uniform manner. In this paper we propose a micro-proxy
architecture that utilizes reverse engineering techniques to identify a valid
universe of discourse for a network service. This valid universe of discourse
is then applied to validate legitimate transactions to a service. Thus in
effect, the micro proxy implements a default deny
policy via the analysis of the application level discourse.
Related Articles:
-
Wei Hu
-
Denis Adesina Daniel, David Uchena Enweremadu
-
Seyed Omidreza Shobairi, Mingyang Li
-
Lijun Zhang, Douglas Lowrie, Honghao Zhou
-
Saeid Nazemi, Reza Chaman