[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1109/SP.2006.41guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Towards Automatic Generation of Vulnerability-Based Signatures

Published: 21 May 2006 Publication History

Abstract

In this paper we explore the problem of creating vulnerability signatures. A vulnerability signature matches all exploits of a given vulnerability, even polymorphic or metamorphic variants. Our work departs from previous approaches by focusing on the semantics of the program and vulnerability exercised by a sample exploit instead of the semantics or syntax of the exploit itself. We show the semantics of a vulnerability define a language which contains all and only those inputs that exploit the vulnerability. A vulnerability signature is a representation (e.g., a regular expression) of the vulnerability language. Unlike exploitbased signatures whose error rate can only be empirically measured for known test cases, the quality of a vulnerability signature can be formally quantified for all possible inputs.

Cited By

View all
  • (2021)Automated Bug Hunting With Data-Driven Symbolic Root Cause AnalysisProceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security10.1145/3460120.3485363(320-336)Online publication date: 12-Nov-2021
  • (2021)AutoComboProceedings of the 30th ACM International Conference on Information & Knowledge Management10.1145/3459637.3481896(3777-3786)Online publication date: 26-Oct-2021
  • (2021)CinnamonProceedings of the 2021 IEEE/ACM International Symposium on Code Generation and Optimization10.1109/CGO51591.2021.9370313(103-114)Online publication date: 27-Feb-2021
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
SP '06: Proceedings of the 2006 IEEE Symposium on Security and Privacy
May 2006
399 pages
ISBN:0769525741

Publisher

IEEE Computer Society

United States

Publication History

Published: 21 May 2006

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 16 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2021)Automated Bug Hunting With Data-Driven Symbolic Root Cause AnalysisProceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security10.1145/3460120.3485363(320-336)Online publication date: 12-Nov-2021
  • (2021)AutoComboProceedings of the 30th ACM International Conference on Information & Knowledge Management10.1145/3459637.3481896(3777-3786)Online publication date: 26-Oct-2021
  • (2021)CinnamonProceedings of the 2021 IEEE/ACM International Symposium on Code Generation and Optimization10.1109/CGO51591.2021.9370313(103-114)Online publication date: 27-Feb-2021
  • (2019)Understanding and securing device vulnerabilities through automated bug report analysisProceedings of the 28th USENIX Conference on Security Symposium10.5555/3361338.3361400(887-903)Online publication date: 14-Aug-2019
  • (2019)Automated Pattern Inference Based on Repeatedly Observed Malware ArtifactsProceedings of the 14th International Conference on Availability, Reliability and Security10.1145/3339252.3340510(1-10)Online publication date: 26-Aug-2019
  • (2019)Defeating denial-of-service attacks in a self-managing N-variant systemProceedings of the 14th International Symposium on Software Engineering for Adaptive and Self-Managing Systems10.1109/SEAMS.2019.00024(126-138)Online publication date: 25-May-2019
  • (2018)A search system for mathematical expressions on software binariesProceedings of the 15th International Conference on Mining Software Repositories10.1145/3196398.3196413(487-491)Online publication date: 28-May-2018
  • (2017)Automatically Inferring Malware Signatures for Anti-Virus Assisted AttacksProceedings of the 2017 ACM on Asia Conference on Computer and Communications Security10.1145/3052973.3053002(587-598)Online publication date: 2-Apr-2017
  • (2017)Extracting Conditional Formulas for Cross-Platform Bug SearchProceedings of the 2017 ACM on Asia Conference on Computer and Communications Security10.1145/3052973.3052995(346-359)Online publication date: 2-Apr-2017
  • (2016)VulPeckerProceedings of the 32nd Annual Conference on Computer Security Applications10.1145/2991079.2991102(201-213)Online publication date: 5-Dec-2016
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media