ABSTRACT

In this chapter, we describe the design and implementation of our tool called DExtor for detecting remote exploits. In particular, the architecture of the tool, feature extraction, and classi’cation techniques are discussed.