Sciweavers

46 search results - page 10 / 10
» A Model for the Semantics of Attack Signatures in Misuse Det...
Sort
View
ACSAC
2006
IEEE
13 years 10 months ago
How to Automatically and Accurately Sandbox Microsoft IIS
Comparing the system call sequence of a network application against a sandboxing policy is a popular approach to detecting control-hijacking attack, in which the attacker exploits...
Wei Li, Lap-Chung Lam, Tzi-cker Chiueh