Towards automatic generation of vulnerability-based signatures (2006)

by David Brumley , James Newsome , Dawn Song , Hao Wang , Somesh Jha
Venue:In Proceedings of the 2006 IEEE Symposium on Security and Privacy
Citations:134 - 26 self

Documents Related by Co-Citation

246 Vigilante: End-to-End Containment of Internet Worm Epidemics – Manuel Costa, Jon Crowcroft, Miguel Castro, Antony Rowstron, Lidong Zhou, Lintao Zhang, Paul Barham - 2008
483 Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software – James Newsome, Dawn Song - 2005
523 DART: Directed automated random testing – Patrice Godefroid, Nils Klarlund, Koushik Sen - 2005
272 Automated worm fingerprinting – Sumeet Singh, Cristian Estan, George Varghese, Stefan Savage - 2004
85 On Deriving Unknown Vulnerabilities from Zero-Day Polymorphic and Metamorphic Worm Exploits – Jedidiah R. Crandall, Zhendong Su - 2005
91 Fast and Automated Generation of Attack Signatures: A Basis for Building Self-Protecting Servers – Zhenkai Liang, R. Sekar - 2005
212 Polygraph: Automatically generating signatures for polymorphic worms – James Newsome - 2005
165 Honeycomb - Creating Intrusion Detection Signatures Using Honeypots – Christian Kreibich, Jon Crowcroft - 2003
301 Autograph: Toward automated, distributed worm signature detection – Hyang-ah Kim - 2004
159 Shield: Vulnerability-Driven Network Filters for Preventing Known Vulnerability Exploits – Helen J. Wang, Helen J. Wang, Chuanxiong Guo, Chuanxiong Guo, Daniel R. Simon, Daniel R. Simon, Alf Zugenmaier, Alf Zugenmaier - 2004
129 A decision procedure for bitvectors and arrays – Vijayganeshanddavidl. Dill - 2007
960 Advanced Compiler Design and Implementation – S S Muchnick - 1997
1404 A Discipline of Programming – E Dijkstra - 1976
163 Automated Whitebox Fuzz Testing – Patrice Godefroid, Michael Y. Levin, David Molnar
35 Creating vulnerability signatures using weakest preconditions – D Brumley, H Wang, S Jha, D Song - 2007
63 Bouncer: securing software by blocking bad input – M Costa, M Castro, L Zhou, L Zhang, M Peinado - 2007
43 Towards automatic discovery of deviations in binary implementations with applications to error detection and fingerprint generation – David Brumley, Juan Caballero, Zhenkai Liang, James Newsome, Dawn Song - 2007
8 STP: A decision procedure for bitvectors and arrays – V Ganesh, D Dill
484 Symbolic Executed and Program Testing – J C King - 1976