Back to Results
First PageMeta Content
Computer security / Hacking / Computer network security / Vulnerability / Communications protocol / Social vulnerability / Symbolic execution / Intrusion prevention system / Parsing / Computing / Software testing / Cyberwarfare


Towards Generating High Coverage Vulnerability-Based Signatures with Protocol-Level Constraint-Guided Exploration Juan Caballero21 , Zhenkai Liang3 , Pongsin Poosankam21 , Dawn Song1 1
Add to Reading List

Document Date: 2013-09-09 05:44:56


Open Document

File Size: 162,95 KB

Share Result on Facebook

City

Heuristic / FIELD / Coverage Vulnerability / /

Company

Elcano / Symantec / Exploration / Microsoft / /

Event

FDA Phase / /

Facility

UC Berkeley Carnegie Mellon University National University of Singapore / /

IndustryTerm

search space explosion / software vendors / Internet Security Threat Report hundreds / given protocol / search space explosion problem / field constraint chain / legacy systems / software developers / binary analysis infrastructure / constraint chain / exhaustive search / software testing / /

NaturalFeature

Path Predicate Extractor Stream / /

Organization

Carnegie Mellon University National University of Singapore / UC Berkeley / /

Position

path predicate extractor / constraint extractor / Execution trace Protocol parser Message format Constraint extractor / Message format Execution trace Path Predicate Extractor / /

Product

MD5 / /

Technology

point Protocol specification Execution Monitor Test result Execution trace Protocol / HTTP / given protocol / level path predicate Field Condition Generator Protocol specification Input Protocol / execution monitor Exploit Program Vulnerability point Protocol / /

SocialTag