Issue No.06 - November/December (2005 vol.3)
Stelios Sidiroglou , Columbia University
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MSP.2005.144
To counter zero-day worms that exploit software flaws such as buffer overflows, this end-point architecture uses source code transformations to automatically create and test software patches for vulnerable segments of targeted applications.
Worms, viruses, honeypots, software patching, process sandboxing, memory protection, buffer overflows
Stelios Sidiroglou, "Countering Network Worms Through Automatic Patch Generation", IEEE Security & Privacy, vol.3, no. 6, pp. 41-49, November/December 2005, doi:10.1109/MSP.2005.144