Sciweavers

47 search results - page 10 / 10
» Privacy Skyline: Privacy with Multidimensional Adversarial K...
Sort
View
CCS
2008
ACM
13 years 6 months ago
A practical mimicry attack against powerful system-call monitors
System-call monitoring has become the basis for many hostbased intrusion detection as well as policy enforcement techniques. Mimicry attacks attempt to evade system-call monitorin...
Chetan Parampalli, R. Sekar, Rob Johnson
SP
2010
IEEE
210views Security Privacy» more  SP 2010»
13 years 8 months ago
Reconciling Belief and Vulnerability in Information Flow
Abstract—Belief and vulnerability have been proposed recently to quantify information flow in security systems. Both concepts stand as alternatives to the traditional approaches...
Sardaouna Hamadou, Vladimiro Sassone, Catuscia Pal...