D Brumley, J Newsome, D Song, H Wang… - 2006 IEEE Symposium …, 2006 - computer.org
In this paper we explore the problem of creating vulnerability signatures. A vulnerability
signature matches all exploits of a given vulnerability, even polymorphic or metamorphic …