Ontology type: schema:Chapter Open Access: True
2009
AUTHORSJuan Caballero , Zhenkai Liang , Pongsin Poosankam , Dawn Song
ABSTRACTSignature-based input filtering is an important and widely deployed defense. But current signature generation methods have limited coverage and the generated signatures often can be easily evaded by an attacker with small variations of the exploit message. In this paper, we propose protocol-level constraint-guided exploration, a new approach towards generating high coverage vulnerability-based signatures. In particular, our approach generates high coverage, yet compact, vulnerability point reachability predicates, which capture many paths to the vulnerability point. In our experimental results, our tool, Elcano, generates compact, high coverage signatures for real-world vulnerabilities. More... »
PAGES161-181
Recent Advances in Intrusion Detection
ISBN
978-3-642-04341-3
978-3-642-04342-0
http://scigraph.springernature.com/pub.10.1007/978-3-642-04342-0_9
DOIhttp://dx.doi.org/10.1007/978-3-642-04342-0_9
DIMENSIONShttps://app.dimensions.ai/details/publication/pub.1029433901
JSON-LD is the canonical representation for SciGraph data.
TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT
[
{
"@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json",
"about": [
{
"id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08",
"inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/",
"name": "Information and Computing Sciences",
"type": "DefinedTerm"
},
{
"id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0801",
"inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/",
"name": "Artificial Intelligence and Image Processing",
"type": "DefinedTerm"
}
],
"author": [
{
"affiliation": {
"alternateName": "UC Berkeley, USA",
"id": "http://www.grid.ac/institutes/grid.47840.3f",
"name": [
"Carnegie Mellon University, USA",
"UC Berkeley, USA"
],
"type": "Organization"
},
"familyName": "Caballero",
"givenName": "Juan",
"id": "sg:person.07456732061.32",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07456732061.32"
],
"type": "Person"
},
{
"affiliation": {
"alternateName": "National University of Singapore, Singapore",
"id": "http://www.grid.ac/institutes/grid.4280.e",
"name": [
"National University of Singapore, Singapore"
],
"type": "Organization"
},
"familyName": "Liang",
"givenName": "Zhenkai",
"id": "sg:person.014106736131.19",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014106736131.19"
],
"type": "Person"
},
{
"affiliation": {
"alternateName": "UC Berkeley, USA",
"id": "http://www.grid.ac/institutes/grid.47840.3f",
"name": [
"Carnegie Mellon University, USA",
"UC Berkeley, USA"
],
"type": "Organization"
},
"familyName": "Poosankam",
"givenName": "Pongsin",
"id": "sg:person.016604336755.76",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016604336755.76"
],
"type": "Person"
},
{
"affiliation": {
"alternateName": "UC Berkeley, USA",
"id": "http://www.grid.ac/institutes/grid.47840.3f",
"name": [
"UC Berkeley, USA"
],
"type": "Organization"
},
"familyName": "Song",
"givenName": "Dawn",
"id": "sg:person.01143152610.86",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.01143152610.86"
],
"type": "Person"
}
],
"datePublished": "2009",
"datePublishedReg": "2009-01-01",
"description": "Signature-based input filtering is an important and widely deployed defense. But current signature generation methods have limited coverage and the generated signatures often can be easily evaded by an attacker with small variations of the exploit message. In this paper, we propose protocol-level constraint-guided exploration, a new approach towards generating high coverage vulnerability-based signatures. In particular, our approach generates high coverage, yet compact, vulnerability point reachability predicates, which capture many paths to the vulnerability point. In our experimental results, our tool, Elcano, generates compact, high coverage signatures for real-world vulnerabilities.",
"editor": [
{
"familyName": "Kirda",
"givenName": "Engin",
"type": "Person"
},
{
"familyName": "Jha",
"givenName": "Somesh",
"type": "Person"
},
{
"familyName": "Balzarotti",
"givenName": "Davide",
"type": "Person"
}
],
"genre": "chapter",
"id": "sg:pub.10.1007/978-3-642-04342-0_9",
"inLanguage": "en",
"isAccessibleForFree": true,
"isPartOf": {
"isbn": [
"978-3-642-04341-3",
"978-3-642-04342-0"
],
"name": "Recent Advances in Intrusion Detection",
"type": "Book"
},
"keywords": [
"real-world vulnerabilities",
"signature generation method",
"reachability predicate",
"generation method",
"vulnerability points",
"experimental results",
"new approach",
"attacker",
"Elcano",
"predicates",
"filtering",
"messages",
"input filtering",
"vulnerability",
"exploration",
"high coverage",
"constraints",
"signatures",
"tool",
"coverage",
"path",
"method",
"defense",
"point",
"results",
"approach",
"small variations",
"variation",
"paper"
],
"name": "Towards Generating High Coverage Vulnerability-Based Signatures with Protocol-Level Constraint-Guided Exploration",
"pagination": "161-181",
"productId": [
{
"name": "dimensions_id",
"type": "PropertyValue",
"value": [
"pub.1029433901"
]
},
{
"name": "doi",
"type": "PropertyValue",
"value": [
"10.1007/978-3-642-04342-0_9"
]
}
],
"publisher": {
"name": "Springer Nature",
"type": "Organisation"
},
"sameAs": [
"https://doi.org/10.1007/978-3-642-04342-0_9",
"https://app.dimensions.ai/details/publication/pub.1029433901"
],
"sdDataset": "chapters",
"sdDatePublished": "2022-05-20T07:45",
"sdLicense": "https://scigraph.springernature.com/explorer/license/",
"sdPublisher": {
"name": "Springer Nature - SN SciGraph project",
"type": "Organization"
},
"sdSource": "s3://com-springernature-scigraph/baseset/20220519/entities/gbq_results/chapter/chapter_286.jsonl",
"type": "Chapter",
"url": "https://doi.org/10.1007/978-3-642-04342-0_9"
}
]
Download the RDF metadata as: json-ld nt turtle xml License info
JSON-LD is a popular format for linked data which is fully compatible with JSON.
curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-04342-0_9'
N-Triples is a line-based linked data format ideal for batch operations.
curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-04342-0_9'
Turtle is a human-readable linked data format.
curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-04342-0_9'
RDF/XML is a standard XML format for linked data.
curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-04342-0_9'
This table displays all metadata directly associated to this object as RDF triples.
124 TRIPLES
23 PREDICATES
55 URIs
48 LITERALS
7 BLANK NODES