Attack signature generation by traceable dynamic taint analysis
Most of known attack signature generation systems took either black-box method or white-box method,both of which were limited in several aspects,such as costing a long time to capture sufficient samples,demanding arduous manual analysis and requiring source code of the vulnerable program.An attack s...
Saved in:
| Main Authors: | Yu LIU, Mei-ning NIE, Pu-rui SU, Deng-guo FENG |
|---|---|
| Format: | Article |
| Language: | zho |
| Published: |
Editorial Department of Journal on Communications
2012-05-01
|
| Series: | Tongxin xuebao |
| Subjects: | |
| Online Access: | http://www.joconline.com.cn/zh/article/doi/1000-436X(2012)05-0021-08/ |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Securing federated learning: a defense strategy against targeted data poisoning attack
by: Ansam Khraisat, et al.
Published: (2025-02-01) -
A Multi-Signature Scheme for Defending Malleability Attack on DeFi
by: Chen Zhang, et al.
Published: (2025-01-01) -
Mechanism and implementation of Rootkit attack and defense
by: Fujuan LI, et al.
Published: (2018-12-01) -
A Review of State-of-the-Art Malware Attack Trends and Defense Mechanisms
by: Jannatul Ferdous, et al.
Published: (2023-01-01) -
A Survey on Adversarial Attacks for Malware Analysis
by: Kshitiz Aryal, et al.
Published: (2025-01-01)