Issue No. 06 - November/December (2005 vol. 3)
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MSP.2005.144
Angelos D. Keromytis , Columbia University
Stelios Sidiroglou , Columbia University
To counter zero-day worms that exploit software flaws such as buffer overflows, this end-point architecture uses source code transformations to automatically create and test software patches for vulnerable segments of targeted applications.
Worms, viruses, honeypots, software patching, process sandboxing, memory protection, buffer overflows
Angelos D. Keromytis, Stelios Sidiroglou, "Countering Network Worms Through Automatic Patch Generation", IEEE Security & Privacy, vol. 3, no. , pp. 41-49, November/December 2005, doi:10.1109/MSP.2005.144