Open Access System for Information Sharing

Login Library

 

Article
Cited 3 time in webofscience Cited 3 time in scopus
Metadata Downloads
Full metadata record
Files in This Item:
There are no files associated with this item.
DC FieldValueLanguage
dc.contributor.authorKwon, OH-
dc.contributor.authorLee, SM-
dc.contributor.authorLee, H-
dc.contributor.authorKim, J-
dc.contributor.authorKim, SC-
dc.contributor.authorNam, GW-
dc.contributor.authorPark, JG-
dc.date.accessioned2016-04-01T02:13:05Z-
dc.date.available2016-04-01T02:13:05Z-
dc.date.created2009-02-28-
dc.date.issued2005-01-
dc.identifier.issn0302-9743-
dc.identifier.other2005-OAK-0000004998-
dc.identifier.urihttps://oasis.postech.ac.kr/handle/2014.oak/24679-
dc.description.abstractWe propose an extensible exploit framework for automation of penetration testing (or pen-testing) without loss of safety and describe possible methods for sanitizing unreliable code in each part of the framework. The proposed framework plays a key role in implementing HackSim a pen-testing tool that remotely exploits known buffer-overflow vulnerabilities. Implementing our enhanced version of HackSim for Solaris and Windows systems, we show the advantages of our sanitized pen-testing tool in terms of safety compared with existing pen-testing tools and exploit frameworks. This work is stepping toward a systematic approach for substituting difficult parts of the labor-intensive pen-testing process.-
dc.description.statementofresponsibilityX-
dc.languageEnglish-
dc.publisherSPRINGER-VERLAG BERLIN-
dc.relation.isPartOfLECTURE NOTES IN COMPUTER SCIENCE-
dc.titleHackSim: An automation of penetration testing for remote buffer overflow vulnerabilities-
dc.typeArticle-
dc.contributor.college컴퓨터공학과-
dc.identifier.doi10.1007/978-3-540-30582-8_68-
dc.author.googleKwon, OH-
dc.author.googleLee, SM-
dc.author.googleLee, H-
dc.author.googleKim, J-
dc.author.googleKim, SC-
dc.author.googleNam, GW-
dc.author.googlePark, JG-
dc.relation.volume3391-
dc.relation.startpage652-
dc.relation.lastpage661-
dc.contributor.id10074421-
dc.relation.journalLECTURE NOTES IN COMPUTER SCIENCE-
dc.relation.indexSCI급, SCOPUS 등재논문-
dc.relation.sciSCIE-
dc.collections.nameConference Papers-
dc.type.rimsART-
dc.identifier.bibliographicCitationLECTURE NOTES IN COMPUTER SCIENCE, v.3391, pp.652 - 661-
dc.identifier.wosid000228095300068-
dc.date.tcdate2019-02-01-
dc.citation.endPage661-
dc.citation.startPage652-
dc.citation.titleLECTURE NOTES IN COMPUTER SCIENCE-
dc.citation.volume3391-
dc.contributor.affiliatedAuthorKim, J-
dc.identifier.scopusid2-s2.0-24144467795-
dc.description.journalClass1-
dc.description.journalClass1-
dc.description.wostc2-
dc.type.docTypeArticle; Proceedings Paper-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryComputer Science, Theory & Methods-
dc.relation.journalWebOfScienceCategoryTelecommunications-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaTelecommunications-

qr_code

  • mendeley

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher

김종KIM, JONG
Dept of Computer Science & Enginrg
Read more

Views & Downloads

Browse