1 |
A. Bellissimo, J. Burgess, and K. Fu. Secure Software Updates: Disappointments and new challenges. In Proceedings of HotSec '06, p37-43. USENIX, July 2006.
|
2 |
Dave. S, Application Whitelisting: Enhancing Host Security, A SANS Whitepaper, p1-14, 2009
|
3 |
Bjoern M, Luettmann and Adam C. Bender, Man-in-the-Middle Attacks on Auto-Updating Software, Bell Labs Technical Journal 12(3), p131-138, 2007
|
4 |
Wireshark: http://www.wireshark.org
|
5 |
SSL(Secure Sockets Layer) Protocol Version 3.0 http://tools.ietf.org/html/rfc6101
|
6 |
Process Monitor: http://technet.microsoft.com/en-us/sysinternals/bb896645.
|
7 |
Whitelist Security, Network Times, p153-162, 2010
|