Automatic Generation of Buffer Overflow Attack Signatures: An Approach Based on Program Behavior Models

Zhenkai Liang, R. Sekar. Automatic Generation of Buffer Overflow Attack Signatures: An Approach Based on Program Behavior Models. In 21st Annual Computer Security Applications Conference (ACSAC 2005), 5-9 December 2005, Tucson, AZ, USA. pages 215-224, IEEE Computer Society, 2005. [doi]

@inproceedings{LiangS05:2,
  title = {Automatic Generation of Buffer Overflow Attack Signatures: An Approach Based on Program Behavior Models},
  author = {Zhenkai Liang and R. Sekar},
  year = {2005},
  doi = {10.1109/CSAC.2005.12},
  url = {http://doi.ieeecomputersociety.org/10.1109/CSAC.2005.12},
  tags = {rule-based, systematic-approach},
  researchr = {https://researchr.org/publication/LiangS05%3A2},
  cites = {0},
  citedby = {0},
  pages = {215-224},
  booktitle = {21st Annual Computer Security Applications Conference (ACSAC 2005), 5-9 December 2005, Tucson, AZ, USA},
  publisher = {IEEE Computer Society},
  isbn = {0-7695-2461-3},
}