On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits
- 7 November 2005
- conference paper
- Published by Association for Computing Machinery (ACM)
- p. 235-248
- https://doi.org/10.1145/1102120.1102152
Abstract
No abstract availableKeywords
This publication has 24 references indexed in Scilit:
- A Fast Static Analysis Approach to Detect Exploit Code Inside Network FlowsPublished by Springer Nature ,2006
- On Interactive Internet Traffic ReplayPublished by Springer Nature ,2006
- Execution Generated Test Cases: How to Make Systems Code Crash ItselfPublished by Springer Nature ,2005
- Experiences Using Minos as a Tool for Capturing and Analyzing Novel Worms for Unknown VulnerabilitiesPublished by Springer Nature ,2005
- Hybrid Engine for Polymorphic Shellcode DetectionPublished by Springer Nature ,2005
- TCPtransform: Property-Oriented TCP Traffic TransformationPublished by Springer Nature ,2005
- Enhancing the Accuracy of Network-Based Intrusion Detection with Host-Based ContextPublished by Springer Nature ,2005
- ReVirtACM SIGOPS Operating Systems Review, 2002
- An empirical study of the reliability of UNIX utilitiesCommunications of the ACM, 1990
- Symbolic execution and program testingCommunications of the ACM, 1976