DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kwon, OH | - |
dc.contributor.author | Lee, SM | - |
dc.contributor.author | Lee, H | - |
dc.contributor.author | Kim, J | - |
dc.contributor.author | Kim, SC | - |
dc.contributor.author | Nam, GW | - |
dc.contributor.author | Park, JG | - |
dc.date.accessioned | 2016-04-01T02:13:05Z | - |
dc.date.available | 2016-04-01T02:13:05Z | - |
dc.date.created | 2009-02-28 | - |
dc.date.issued | 2005-01 | - |
dc.identifier.issn | 0302-9743 | - |
dc.identifier.other | 2005-OAK-0000004998 | - |
dc.identifier.uri | https://oasis.postech.ac.kr/handle/2014.oak/24679 | - |
dc.description.abstract | We propose an extensible exploit framework for automation of penetration testing (or pen-testing) without loss of safety and describe possible methods for sanitizing unreliable code in each part of the framework. The proposed framework plays a key role in implementing HackSim a pen-testing tool that remotely exploits known buffer-overflow vulnerabilities. Implementing our enhanced version of HackSim for Solaris and Windows systems, we show the advantages of our sanitized pen-testing tool in terms of safety compared with existing pen-testing tools and exploit frameworks. This work is stepping toward a systematic approach for substituting difficult parts of the labor-intensive pen-testing process. | - |
dc.description.statementofresponsibility | X | - |
dc.language | English | - |
dc.publisher | SPRINGER-VERLAG BERLIN | - |
dc.relation.isPartOf | LECTURE NOTES IN COMPUTER SCIENCE | - |
dc.title | HackSim: An automation of penetration testing for remote buffer overflow vulnerabilities | - |
dc.type | Article | - |
dc.contributor.college | 컴퓨터공학과 | - |
dc.identifier.doi | 10.1007/978-3-540-30582-8_68 | - |
dc.author.google | Kwon, OH | - |
dc.author.google | Lee, SM | - |
dc.author.google | Lee, H | - |
dc.author.google | Kim, J | - |
dc.author.google | Kim, SC | - |
dc.author.google | Nam, GW | - |
dc.author.google | Park, JG | - |
dc.relation.volume | 3391 | - |
dc.relation.startpage | 652 | - |
dc.relation.lastpage | 661 | - |
dc.contributor.id | 10074421 | - |
dc.relation.journal | LECTURE NOTES IN COMPUTER SCIENCE | - |
dc.relation.index | SCI급, SCOPUS 등재논문 | - |
dc.relation.sci | SCIE | - |
dc.collections.name | Conference Papers | - |
dc.type.rims | ART | - |
dc.identifier.bibliographicCitation | LECTURE NOTES IN COMPUTER SCIENCE, v.3391, pp.652 - 661 | - |
dc.identifier.wosid | 000228095300068 | - |
dc.date.tcdate | 2019-02-01 | - |
dc.citation.endPage | 661 | - |
dc.citation.startPage | 652 | - |
dc.citation.title | LECTURE NOTES IN COMPUTER SCIENCE | - |
dc.citation.volume | 3391 | - |
dc.contributor.affiliatedAuthor | Kim, J | - |
dc.identifier.scopusid | 2-s2.0-24144467795 | - |
dc.description.journalClass | 1 | - |
dc.description.journalClass | 1 | - |
dc.description.wostc | 2 | - |
dc.type.docType | Article; Proceedings Paper | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Theory & Methods | - |
dc.relation.journalWebOfScienceCategory | Telecommunications | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Telecommunications | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.
library@postech.ac.kr Tel: 054-279-2548
Copyrights © by 2017 Pohang University of Science ad Technology All right reserved.