Back to Results
First PageMeta Content
Computability theory / Theoretical computer science / Software testing / Hacking / Vulnerability / Social vulnerability / Buffer overflow / Electronic signature / Halting problem / Mathematics / Applied mathematics / Computer science


Towards Automatic Generation of Vulnerability-Based Signatures David Brumley, James Newsome, and Dawn Song Carnegie Mellon University Pittsburgh, PA, USA {dbrumley,jnewsome,dawnsong}@cmu.edu
Add to Reading List

Document Date: 2013-03-28 20:19:28


Open Document

File Size: 240,40 KB

Share Result on Facebook

Company

P. Formally LP / /

Country

United States / /

/

Facility

Somesh Jha University of Wisconsin-Madison Madison / Dawn Song Carnegie Mellon University / /

IndustryTerm

final solution / software vulnerability / vulnerability detection algorithm / security applications / Incomplete solutions / constraint systems / signature-creation algorithm / vulnerability condition algorithm / pre-processing phase / /

Organization

Dawn Song Carnegie Mellon University Pittsburgh / University of Wisconsin / /

Person

James Newsome / Dawn Song Carnegie / /

Position

straight-forward / /

ProvinceOrState

Wisconsin / /

Technology

signature-creation algorithm / vulnerability detection algorithm / following algorithm / vulnerability condition algorithm / /

SocialTag