Abstract
The explosively increasing use of Internet has brought to the emergence and dissemination of new network worms and viruses. The techniques exploited by those malicious software codes become so sophisticated that even newly updated anti-virus engines often fail to detect the existence of the codes successfully. One of the security defects in network services often exploited by the codes is the vulnerability due to buffer overflow [1].
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Pheonoelit, Bug Hunting (Vulnerability finding methods in Windows 32 environments compared), http://www.phenoelit.de/stuff/Bugs.pdf
Begic, G.: An Introduction to Runtime Analysis with Rational PurifyPlus, Rational Software (December 2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Song, Y.H., Park, J.M., Park, Y., Im, E.G. (2006). A New Methodology of Analyzing Security Vulnerability for Network Services. In: Mehrotra, S., Zeng, D.D., Chen, H., Thuraisingham, B., Wang, FY. (eds) Intelligence and Security Informatics. ISI 2006. Lecture Notes in Computer Science, vol 3975. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11760146_112
Download citation
DOI: https://doi.org/10.1007/11760146_112
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-34478-0
Online ISBN: 978-3-540-34479-7
eBook Packages: Computer ScienceComputer Science (R0)