DOI: 10.1007/978-3-540-87403-4_9
|View full text |Cite
|
Sign up to set email alerts
|

High-Speed Matching of Vulnerability Signatures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
16
0

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 15 publications
(16 citation statements)
references
References 17 publications
0
16
0
Order By: Relevance
“…They are either hand optimized for better performance [5], or they are derived from an unoptimizable parsing model: recursive descent parsing with code execution [11], [12]. Hand optimized solutions suffer from a high production cost and are prone to errors [11], [12].…”
Section: B Limitations Of Prior Artmentioning
confidence: 99%
See 3 more Smart Citations
“…They are either hand optimized for better performance [5], or they are derived from an unoptimizable parsing model: recursive descent parsing with code execution [11], [12]. Hand optimized solutions suffer from a high production cost and are prone to errors [11], [12].…”
Section: B Limitations Of Prior Artmentioning
confidence: 99%
“…To illustrate one dimension where previous solutions struggle, we highlight the conflict between automated translation and optimization with line-speed extraction. One technique that can be exploited to achieve line-speed extraction is to ignore (not parse) unnecessary data [5]; we refer to this as selective parsing. Previous selective parsing work achieves higher throughput through hand pruning rather than automated translation and optimization [5], [13].…”
Section: B Limitations Of Prior Artmentioning
confidence: 99%
See 2 more Smart Citations
“…Although there have been recent approaches, such as in [237,252,273], to optimize IDPS resource consumption, we still need to deal with resource constraints and make the best use of an IDPS with available resource budgets.…”
Section: Motivationmentioning
confidence: 99%