Sciweavers

11 search results - page 3 / 3
» Using Counterexamples for Improving the Precision of Reachab...
Sort
View
RAID
2005
Springer
13 years 10 months ago
Environment-Sensitive Intrusion Detection
We perform host-based intrusion detection by constructing a model from a program’s binary code and then restricting the program’s execution by the model. We improve the effecti...
Jonathon T. Giffin, David Dagon, Somesh Jha, Wenke...