Automatically creating reliable signatures of zero-day exploits is the focus of intense research efforts.