Sciweavers

233 search results - page 2 / 47
» The Evolution of System-Call Monitoring
Sort
View
ACSAC
2005
IEEE
13 years 11 months ago
e-NeXSh: Achieving an Effectively Non-Executable Stack and Heap via System-Call Policing
We present e-NeXSh, a novel security approach that utilises kernel and LIBC support for efficiently defending systems against process-subversion attacks. Such attacks exploit vul...
Gaurav S. Kc, Angelos D. Keromytis
NDSS
2000
IEEE
13 years 8 months ago
User-Level Infrastructure for System Call Interposition: A Platform for Intrusion Detection and Confinement
Several new approaches for detecting malicious attacks on computer systems and/or confining untrusted or malicious applications have emerged over the past several years. These tec...
K. Jain, R. Sekar
USENIX
2004
13 years 6 months ago
Making the "Box" Transparent: System Call Performance as a First-Class Result
For operating system intensive applications, the ability of designers to understand system call performance behavior is essential to achieving high performance. Conventional perfo...
Yaoping Ruan, Vivek S. Pai
SEDE
2007
13 years 6 months ago
Monitoring software technology evolution, one trend at a time
The ability to model the evolution of software technology trends is valuable to many stakeholders in industry, academia, and government. Yet we often depend exclusively on the opi...
Yanzhi Bai, Ali Mili
EWSPT
2000
Springer
13 years 8 months ago
Advanced Services for Process Evolution: Monitoring and Decision Support
Process support environments (PSEs) are widely used for modelling, enacting and analyzing human intensive processes. The benefits of a PSE become apparent when processes to be supp...
Ilham Alloui, Sami Beydeda, Sorana Cîmpan, V...