A system creates a secondary stack containing execution information of at
least one function operating on the computer system, and receives an
attack notification of an attack on the computer system. The system
determines a point in the secondary stack at which a recovery from the
attack is possible. In one embodiment, the system then generates a
signature of the attack based on the execution information contained
within the secondary stack.