Zhenkai Liang, R. Sekar. Automatic Generation of Buffer Overflow Attack Signatures: An Approach Based on Program Behavior Models. In 21st Annual Computer Security Applications Conference (ACSAC 2005), 5-9 December 2005, Tucson, AZ, USA. pages 215-224, IEEE Computer Society, 2005. [doi]
@inproceedings{LiangS05:2, title = {Automatic Generation of Buffer Overflow Attack Signatures: An Approach Based on Program Behavior Models}, author = {Zhenkai Liang and R. Sekar}, year = {2005}, doi = {10.1109/CSAC.2005.12}, url = {http://doi.ieeecomputersociety.org/10.1109/CSAC.2005.12}, tags = {rule-based, systematic-approach}, researchr = {https://researchr.org/publication/LiangS05%3A2}, cites = {0}, citedby = {0}, pages = {215-224}, booktitle = {21st Annual Computer Security Applications Conference (ACSAC 2005), 5-9 December 2005, Tucson, AZ, USA}, publisher = {IEEE Computer Society}, isbn = {0-7695-2461-3}, }