The adoption of various automatic software update mechansim by both the commercial and open-source software developers to protect computer systems from virus writers and virus distributors is discussed. Antivirus developers have automated the signature creation and testing process to detect zero-day worms. Malware developers can discover new vulnerabilities by working in parallel and automating vulnerability discover and exploitation. A nonexecutable stacks and anomaly-based intrusion prevention systems prevent exploits without signatures or software patches.

Additional Metadata
Persistent URL dx.doi.org/10.1109/MSP.2004.100
Journal IEEE Security and Privacy
Citation
Somayaji, A. (2004). How to win an evolutionary arms race. IEEE Security and Privacy (Vol. 2, pp. 70–72). doi:10.1109/MSP.2004.100