Theory and Techniques for Automatic Generation of Vulnerability-Based Signatures

David Brumley, James Newsome, D. Song, Hao Wang, Somesh Jha. Theory and Techniques for Automatic Generation of Vulnerability-Based Signatures. IEEE Trans. Dependable Sec. Comput., 5(4):224-241, 2008. [doi]

@article{BrumleyNSWJ08,
  title = {Theory and Techniques for Automatic Generation of Vulnerability-Based Signatures},
  author = {David Brumley and James Newsome and D. Song and Hao Wang and Somesh Jha},
  year = {2008},
  doi = {10.1109/TDSC.2008.55},
  url = {http://dx.doi.org/10.1109/TDSC.2008.55},
  tags = {rule-based},
  researchr = {https://researchr.org/publication/BrumleyNSWJ08},
  cites = {0},
  citedby = {0},
  journal = {IEEE Trans. Dependable Sec. Comput.},
  volume = {5},
  number = {4},
  pages = {224-241},
}