Allergy Attack Against Automatic Signature Generation

  title={Allergy Attack Against Automatic Signature Generation},
  author={Simon P. Chung and Aloysius K. Mok},
Research in systems that automatically generate signatures to filter out zero-day worm instances at perimeter defense has received a lot of attention recently. While a well known problem with these systems is that the signatures generated are usually not very useful against polymorphic worms, we shall in this paper investigate a different, and potentially more serious problem facing automatic signature generation systems: attacks that manipulate the signature generation system and turn it into… CONTINUE READING
Highly Cited
This paper has 64 citations. REVIEW CITATIONS


Publications citing this paper.
Showing 1-10 of 44 extracted citations

F-Sign: Automatic, Function-Based Signature Generation for Malware

IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews) • 2011
View 6 Excerpts
Highly Influenced

Multi-agent Reinforcement Learning for Intrusion Detection

Adaptive Agents and Multi-Agents Systems • 2007
View 3 Excerpts
Highly Influenced

Adversarial Machine Learning: The Case of Recommendation Systems

2018 IEEE 19th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC) • 2018
View 1 Excerpt

Simulating Exploits for the Creation and Refinement of Detection Signatures

2017 IEEE 25th International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS) • 2017
View 3 Excerpts

65 Citations

Citations per Year
Semantic Scholar estimates that this publication has 65 citations based on the available data.

See our FAQ for additional information.


Publications referenced by this paper.
Showing 1-10 of 14 references

Polygraph: automatically generating signatures for polymorphic worms

2005 IEEE Symposium on Security and Privacy (S&P'05) • 2005
View 9 Excerpts
Highly Influenced

Autograph: Toward Automated, Distributed Worm Signature Detection

USENIX Security Symposium • 2004
View 6 Excerpts
Highly Influenced

Similar Papers

Loading similar papers…