Automatic Generation of Buffer Overflow Attack Signatures: An Approach Based on Program Behavior Models

  • Authors:
  • Zhenkai Liang;R. Sekar

  • Affiliations:
  • Stony Brook University, NY;Stony Brook University, NY

  • Venue:
  • ACSAC '05 Proceedings of the 21st Annual Computer Security Applications Conference
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

When will we be secure? Nobody knows for surebut it cannot happen before commercial security products and services possess not only enough functionality to satisfy customers' stated needs, but also sufficient assurance of quality, reliability, safety, ...