2004-11-01
How to win an evolutionary arms race
Publication
Publication
IEEE Security and Privacy , Volume 2 - Issue 6 p. 70- 72
The adoption of various automatic software update mechansim by both the commercial and open-source software developers to protect computer systems from virus writers and virus distributors is discussed. Antivirus developers have automated the signature creation and testing process to detect zero-day worms. Malware developers can discover new vulnerabilities by working in parallel and automating vulnerability discover and exploitation. A nonexecutable stacks and anomaly-based intrusion prevention systems prevent exploits without signatures or software patches.
Additional Metadata | |
---|---|
doi.org/10.1109/MSP.2004.100 | |
IEEE Security and Privacy | |
Organisation | Carleton University |
Somayaji, A. (2004). How to win an evolutionary arms race. IEEE Security and Privacy (Vol. 2, pp. 70–72). doi:10.1109/MSP.2004.100
|