Attack signature generation by traceable dynamic taint analysis

Most of known attack signature generation systems took either black-box method or white-box method,both of which were limited in several aspects,such as costing a long time to capture sufficient samples,demanding arduous manual analysis and requiring source code of the vulnerable program.An attack s...

Full description

Saved in:
Bibliographic Details
Main Authors: Yu LIU, Mei-ning NIE, Pu-rui SU, Deng-guo FENG
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2012-05-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/1000-436X(2012)05-0021-08/
Tags: Add Tag
No Tags, Be the first to tag this record!