Automatic generation of buffer overflow attack signatures: an approach based on program behavior models

@article{Liang2005AutomaticGO,
  title={Automatic generation of buffer overflow attack signatures: an approach based on program behavior models},
  author={Zhenkai Liang and R. Sekar},
  journal={21st Annual Computer Security Applications Conference (ACSAC'05)},
  year={2005},
  pages={10 pp.-224}
}
Buffer overflows have become the most common target for network-based attacks. They are also the primary mechanism used by worms and other forms of automated attacks. Although many techniques have been developed to prevent server compromises due to buffer overflows, these defenses still lead to server crashes. When attacks occur repeatedly, as is common with automated attacks, these protection mechanisms lead to repeated restarts of the victim application, rendering its service unavailable. To… CONTINUE READING
Highly Cited
This paper has 51 citations. REVIEW CITATIONS

5 Figures & Tables

Topics

Statistics

0510'05'06'07'08'09'10'11'12'13'14'15'16'17'18
Citations per Year

52 Citations

Semantic Scholar estimates that this publication has 52 citations based on the available data.

See our FAQ for additional information.