Fast and automated generation of attack signatures
- 7 November 2005
- conference paper
- Published by Association for Computing Machinery (ACM)
- p. 213-222
- https://doi.org/10.1145/1102120.1102150
Abstract
No abstract availableKeywords
This publication has 16 references indexed in Scilit:
- FLIPS: Hybrid Adaptive Intrusion PreventionPublished by Springer Nature ,2006
- Polygraph: Automatically Generating Signatures for Polymorphic WormsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2005
- CTCP: A Transparent Centralized TCP/IP Architecture for Network SecurityPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2005
- A Dynamic Technique for Eliminating Buffer Overflow Vulnerabilities (and Other Memory Errors)Published by Institute of Electrical and Electronics Engineers (IEEE) ,2005
- On the effectiveness of address-space randomizationPublished by Association for Computing Machinery (ACM) ,2004
- ShieldPublished by Association for Computing Machinery (ACM) ,2004
- Buttercup: on network-based detection of polymorphic buffer overflow vulnerabilitiesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2004
- Anomalous Payload-Based Network Intrusion DetectionPublished by Springer Nature ,2004
- Countering code-injection attacks with instruction-set randomizationPublished by Association for Computing Machinery (ACM) ,2003
- Fast Effective Rule InductionPublished by Elsevier ,1995