A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2010; you can also visit the original URL.
The file type is application/pdf
.
Creating Vulnerability Signatures Using Weakest Preconditions
2007
Computer Security Foundations Workshop (CSFW), Proceedings of the IEEE
Signature-based tools such as network intrusion detection systems are widely used to protect critical systems. Automatic signature generation techniques are needed to enable these tools due to the speed at which new vulnerabilities are discovered. In particular, we need automatic techniques which generate sound signatures -signatures which will not mistakenly block legitimate traffic or raise false alarms. In addition, we need signatures to have few false negatives and will catch many different
doi:10.1109/csf.2007.17
dblp:conf/csfw/BrumleyWJS07
fatcat:y5wulqp4rndfdjt5jauswvhely