共 25 条
[1]
Attack Surface Expansion Using Decoys to Protect Virtualized Infrastructure
[J].
2017 IEEE 1ST INTERNATIONAL CONFERENCE ON EDGE COMPUTING (IEEE EDGE),
2017,
:216-219
[2]
Vulnerability-based Security Pattern Categorization in Search of Missing Patterns
[J].
2014 NINTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES),
2015,
:476-483
[3]
Automated reduction of attack surface using call graph enumeration
[J].
PROCEEDINGS OF THE 2018 2ND INTERNATIONAL CONFERENCE ON MANAGEMENT ENGINEERING, SOFTWARE ENGINEERING AND SERVICE SCIENCES (ICMSS 2018),
2018,
:118-121
[4]
Bukhari SN, 2018, 2018 4 INT C ADV EL, P1, DOI DOI 10.1109/AEEICB.2018.8480945
[5]
Dark Reading, 2017 SMASH WORLDS RE
[7]
Identity Force, 2018 DAT BREACH WORS
[8]
Koch M, 2000, LECT NOTES COMPUT SC, V1895, P122
[9]
BinRec: Attack Surface Reduction Through Dynamic Binary Recovery
[J].
FEAST'18: PROCEEDINGS OF THE 2018 WORKSHOP ON FORMING AN ECOSYSTEM AROUND SOFTWARE TRANSFORMATION,
2018,
:8-13
[10]
Kurmus Anil., 2011, Proceedings of the Fourth European Workshop on System Security, EUROSEC '11, p6:1, DOI DOI 10.1145/1972551.1972557