Attack signature generation by traceable dynamic taint analysis
Most of known attack signature generation systems took either black-box method or white-box method,both of which were limited in several aspects,such as costing a long time to capture sufficient samples,demanding arduous manual analysis and requiring source code of the vulnerable program.An attack s...
Saved in:
Main Authors: | Yu LIU, Mei-ning NIE, Pu-rui SU, Deng-guo FENG |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2012-05-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/1000-436X(2012)05-0021-08/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
A Multi-Signature Scheme for Defending Malleability Attack on DeFi
by: Chen Zhang, et al.
Published: (2025-01-01) -
Mechanism and implementation of Rootkit attack and defense
by: Fujuan LI, et al.
Published: (2018-12-01) -
Automatic generating regular expression signatures for real network worms
by: Yong TANG, et al.
Published: (2013-03-01) -
MALVADA: A framework for generating datasets of malware execution traces
by: Razvan Raducu, et al.
Published: (2025-05-01) -
Binary program taint analysis optimization method based on function summary
by: Pan YANG, et al.
Published: (2023-04-01)