2022 IEEE Secure Development Conference (SecDev) 2022
DOI: 10.1109/secdev53368.2022.00016
|View full text |Cite
|
Sign up to set email alerts
|

A Comparative Study of Log4Shell Test Tools

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 10 publications
0
1
0
Order By: Relevance
“…Signature-based detection is often realized as software products, relying on knowledge (i.e., signatures) supplied by opensource communities. Optimally selecting appropriate signatures, developed by security experts, could help (to a great extent) network operators (of medium/smaller enterprises) to quickly respond to emerging cyber threats, (e.g., "Log4Shell exploit" [40], [131], [80]). However, appropriately setting up the software environments, routinely updating signatures, and, importantly, trusting the open-source community may not always be feasible for administrators of large organizations.…”
Section: Highlightsmentioning
confidence: 99%
“…Signature-based detection is often realized as software products, relying on knowledge (i.e., signatures) supplied by opensource communities. Optimally selecting appropriate signatures, developed by security experts, could help (to a great extent) network operators (of medium/smaller enterprises) to quickly respond to emerging cyber threats, (e.g., "Log4Shell exploit" [40], [131], [80]). However, appropriately setting up the software environments, routinely updating signatures, and, importantly, trusting the open-source community may not always be feasible for administrators of large organizations.…”
Section: Highlightsmentioning
confidence: 99%