A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits
2005
Proceedings of the 12th ACM conference on Computer and communications security - CCS '05
Vulnerabilities that allow worms to hijack the control flow of each host that they spread to are typically discovered months before the worm outbreak, but are also typically discovered by third party researchers. A determined attacker could discover vulnerabilities as easily and create zero-day worms for vulnerabilities unknown to network defenses. It is important for an analysis tool to be able to generalize from a new exploit observed and derive protection for the vulnerability. Many
doi:10.1145/1102120.1102152
dblp:conf/ccs/CrandallSW05
fatcat:w2qddfyfe5a2zhnsvwzlmy2l34