Issue No. 06 - November/December (2005 vol. 3)
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MSP.2005.144
Stelios Sidiroglou , Columbia University
Angelos D. Keromytis , Columbia University
To counter zero-day worms that exploit software flaws such as buffer overflows, this end-point architecture uses source code transformations to automatically create and test software patches for vulnerable segments of targeted applications.
Worms, viruses, honeypots, software patching, process sandboxing, memory protection, buffer overflows
A. D. Keromytis and S. Sidiroglou, "Countering Network Worms Through Automatic Patch Generation," in IEEE Security & Privacy, vol. 3, no. , pp. 41-49, 2005.