Automatic patch-based exploit generation is possible: Techniques and implications

D Brumley, P Poosankam, D Song… - 2008 IEEE Symposium …, 2008 - ieeexplore.ieee.org
The automatic patch-based exploit generation problem is: given a program P and a patched
version of the program P', automatically generate an exploit for the potentially unknown …

The attack of the clones: A study of the impact of shared code on vulnerability patching

A Nappa, R Johnson, L Bilge… - … IEEE symposium on …, 2015 - ieeexplore.ieee.org
Vulnerability exploits remain an important mechanism for malware delivery, despite efforts to
speed up the creation of patches and improvements in software updating mechanisms …

Shield: Vulnerability-driven network filters for preventing known vulnerability exploits

HJ Wang, C Guo, DR Simon… - Proceedings of the 2004 …, 2004 - dl.acm.org
Software patching has not been effective as a first-line defense against large-scale worm
attacks, even when patches have long been available for their corresponding vulnerabilities …

OPUS: Online Patches and Updates for Security.

G Altekar, I Bagrak, P Burstein, A Schultz - USENIX Security Symposium, 2005 - usenix.org
We present OPUS, a tool for dynamic software patching capable of applying fixes to a C
program at runtime. OPUS's primary goal is to enable application of security patches to …

Automatic exploit generation

T Avgerinos, SK Cha, A Rebert, EJ Schwartz… - Communications of the …, 2014 - dl.acm.org
Automatic exploit generation Page 1 contributed articles 74 CoMMuniCations of the aCM |
feBRuARy 2014 | voL. 57 | No. 2 aTTacKers commonLy eXpLoIT buggy programs to break into …

From patches to honey-patches: Lightweight attacker misdirection, deception, and disinformation

F Araujo, KW Hamlen, S Biedermann… - Proceedings of the …, 2014 - dl.acm.org
Traditional software security patches often have the unfortunate side-effect of quickly alerting
attackers that their attempts to exploit patched vulnerabilities have failed. Attackers greatly …

Large-scale vulnerability analysis

S Frei, M May, U Fiedler, B Plattner - … of the 2006 SIGCOMM workshop on …, 2006 - dl.acm.org
The security level of networks and systems is determined by the software vulnerabilities of its
elements. Defending against large scale attacks requires a quantitative understanding of the …

Towards automatic generation of vulnerability-based signatures

D Brumley, J Newsome, D Song… - 2006 IEEE Symposium …, 2006 - ieeexplore.ieee.org
In this paper we explore the problem of creating vulnerability signatures. A vulnerability
signature matches all exploits of a given vulnerability, even polymorphic or metamorphic …

Automatically patching errors in deployed software

JH Perkins, S Kim, S Larsen, S Amarasinghe… - Proceedings of the …, 2009 - dl.acm.org
We present ClearView, a system for automatically patching errors in deployed software.
ClearView works on stripped Windows x86 binaries without any need for source code …

Fast and automated generation of attack signatures: A basis for building self-protecting servers

Z Liang, R Sekar - Proceedings of the 12th ACM conference on …, 2005 - dl.acm.org
Large-scale attacks, such as those launched by worms and zombie farms, pose a serious
threat to our network-centric society. Existing approaches such as software patches are …