Fast and Automated Generation of Attack Signatures: A Basis for Building Self-Protecting Servers (2005)

by Zhenkai Liang , R. Sekar
Citations:89 - 7 self

Active Bibliography

245 Vigilante: End-to-End Containment of Internet Worm Epidemics – Manuel Costa, Jon Crowcroft, Miguel Castro, Antony Rowstron, Lidong Zhou, Lintao Zhang, Paul Barham - 2008
2 Automated, sub-second attack signature generation: A basis for building self-protecting servers – Zhenkai Liang, R. Sekar - 2005
5 Sting: An End-to-End Self-healing System for Defending against Zero-day Worm Attacks on Commodity Software – James Newsome, David Brumley, Dawn Song - 2005
22 Automatic Generation of Buffer Overflow Attack Signatures: An Approach Based on Program Behavior Models – Zhenkai Liang, R. Sekar - 2005
485 Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software – James Newsome, Dawn Song - 2005
3 Runtime countermeasures for code injection attacks against C and C++ programs – Yves Younan, Wouter Joosen, Frank Piessens
29 Sweeper: A lightweight endto-end system for defending against fast worms – Joseph Tucek, Shan Lu, Chengdu Huang, Spiros Xanthos, Yuanyuan Zhou, James Newsome, David Brumley, Dawn Song
Fast and Black-box Exploit Detection and Signature Generation for Commodity Software – Xiaofeng Wang, Zhuowei Li, Jong Youl Choi, Michael K. Reiter
Software Self-healing Using Error Virtualization – Stylianos Sidiroglou, Stylianos Sidiroglou
2 AutoPaG: Towards Automated Software Patch Generation with Source Code Root Cause Identification and Repair ABSTRACT – Zhiqiang Lin, Xuxian Jiang, Dongyan Xu, Bing Mao, Li Xie
Re-thinking the role of learning in intrusion detection systems – Yingbo Song, Michael E. Locasto, Angelos Stavrou, Y. Song, A. D. Keromytis, S. J. Stolfo, A. D. Keromytis, S. J. Stolfo, A. Stavrou - 2009
1 On the infeasibility of modeling polymorphic shellcode -- Re-thinking . . . – Yingbo Song, Michael E. Locasto, Angelos Stavrou, A. D. Keromytis, S. J. Stolfo - 2009
19 Data space randomization – Eep Bhatkar, R. Sekar - 2008
27 Packet Vaccine: Black-box Exploit Detection and Signature Generation – Xiaofeng Wang, Zhuowei Li, Chongkyung Kil - 2006
5 Data Randomization – Cristian Cadar, Jean-Phillipe Martin, Periklis Akritidis, Manuel Costa, Miguel Castro
worm’s payload. Capturing and Analyzing Internet Worms By – Jedidiah Richard Crandall, Jedidiah Richard Crandall
5 On the infeasibility of Modeling Polymorphic Shellcode for Signature Detection – Yingbo Song, Michael E. Locasto, Angelos Stavrou, Angelos D. Keromytis, Salvatore J. Stolfo - 2007
13 Design space and analysis of worm defense strategies – David Brumley, Li-hao Liu, Pongsin Poosankam, Dawn Song - 2006
12 e-NeXSh: Achieving an effectively non-executable stack and heap via system-call policing – Gaurav S. Kc, Angelos D. Keromytis - 2005