Sciweavers

233 search results - page 1 / 47
» The Evolution of System-Call Monitoring
Sort
View
ACSAC
2008
IEEE
13 years 11 months ago
The Evolution of System-Call Monitoring
Computer security systems protect computers and networks from unauthorized use by external agents and insiders. The similarities between computer security and the problem of prote...
Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaj...
IAW
2003
IEEE
13 years 10 months ago
Detecting Insider Threats by Monitoring System Call Activity
Nam T. Nguyen, Peter L. Reiher, Geoffrey H. Kuenni...
DSN
2005
IEEE
13 years 10 months ago
Authenticated System Calls
System call monitoring is a technique for detecting and controlling compromised applications by checking at runtime that each system call conforms to a policy that specifies the ...
Mohan Rajagopalan, Matti A. Hiltunen, Trevor Jim, ...
NDSS
2003
IEEE
13 years 10 months ago
Traps and Pitfalls: Practical Problems in System Call Interposition Based Security Tools
System call interposition is a powerful method for regulating and monitoring application behavior. In recent years, a wide variety of security tools have been developed that use t...
Tal Garfinkel
COMPSEC
2004
91views more  COMPSEC 2004»
13 years 4 months ago
Predicting the intrusion intentions by observing system call sequences
Identifying the intentions or attempts of the monitored agents through observations is very vital in computer network security. In this paper, a plan recognition method for predict...
Li Feng, Xiaohong Guan, Sangang Guo, Yan Gao, Pein...