Sciweavers

Share
2 search results - page 1 / 1
» Towards Generating High Coverage Vulnerability-Based Signatu...
Sort
View
RAID
2009
Springer
12 years 6 months ago
Towards Generating High Coverage Vulnerability-Based Signatures with Protocol-Level Constraint-Guided Exploration
Abstract. Signature-based input ļ¬ltering is an important and widely deployed defense. But current signature generation methods have limited coverage and the generated signatures ...
Juan Caballero, Zhenkai Liang, Pongsin Poosankam, ...
SP
2006
IEEE
132views Security Privacy» more  SP 2006»
12 years 5 months ago
Towards Automatic Generation of Vulnerability-Based Signatures
In this paper we explore the problem of creating vulnerability signatures. A vulnerability signature matches all exploits of a given vulnerability, even polymorphic or metamorphic...
David Brumley, James Newsome, Dawn Xiaodong Song, ...
books