This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Countering Network Worms Through Automatic Patch Generation
November/December 2005 (vol. 3 no. 6)
pp. 41-49
Stelios Sidiroglou, Columbia University
Angelos D. Keromytis, Columbia University
To counter zero-day worms that exploit software flaws such as buffer overflows, this end-point architecture uses source code transformations to automatically create and test software patches for vulnerable segments of targeted applications.
Index Terms:
Worms, viruses, honeypots, software patching, process sandboxing, memory protection, buffer overflows
Citation:
Stelios Sidiroglou, Angelos D. Keromytis, "Countering Network Worms Through Automatic Patch Generation," IEEE Security & Privacy, vol. 3, no. 6, pp. 41-49, Nov.-Dec. 2005, doi:10.1109/MSP.2005.144
Usage of this product signifies your acceptance of the Terms of Use.