Detecting past and present intrusions through vulnerability-specific predicates

Most systems contain software with yet-to-be-discovered security vulnerabilities. When a vulnerability is disclosed, administrators face the grim reality that they have been running software which ...