Fast and Automated Generation of Attack Signatures: A Basis for Building Self-Protecting Servers (2005)

by Zhenkai Liang , R. Sekar
Citations:99 - 7 self

Documents Related by Co-Citation

490 Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software – James Newsome, Dawn Song - 2005
216 Polygraph: Automatically generating signatures for polymorphic worms – James Newsome - 2005
250 Vigilante: End-to-End Containment of Internet Worm Epidemics – Manuel Costa, Jon Crowcroft, Miguel Castro, Antony Rowstron, Lidong Zhou, Lintao Zhang, Paul Barham - 2008
160 Shield: Vulnerability-Driven Network Filters for Preventing Known Vulnerability Exploits – Helen J. Wang, Helen J. Wang, Chuanxiong Guo, Chuanxiong Guo, Daniel R. Simon, Daniel R. Simon, Alf Zugenmaier, Alf Zugenmaier - 2004
305 Autograph: Toward automated, distributed worm signature detection – Hyang-ah Kim - 2004
86 On Deriving Unknown Vulnerabilities from Zero-Day Polymorphic and Metamorphic Worm Exploits – Jedidiah R. Crandall, Zhendong Su - 2005
167 Honeycomb - Creating Intrusion Detection Signatures Using Honeypots – Christian Kreibich, Jon Crowcroft - 2003
278 Automated worm fingerprinting – Sumeet Singh, Cristian Estan, George Varghese, Stefan Savage - 2004
133 Towards automatic generation of vulnerability-based signatures – David Brumley, James Newsome, Dawn Song, Hao Wang, Somesh Jha - 2006