Sciweavers

35 search results - page 4 / 7
» A Formal Framework for Program Anomaly Detection
Sort
View
70
Voted
KDD
1998
ACM
170views Data Mining» more  KDD 1998»
15 years 2 months ago
Mining Audit Data to Build Intrusion Detection Models
In this paper we discuss a data mining framework for constructing intrusion detection models. The key ideas are to mine system audit data for consistent and useful patterns of pro...
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok
83
Voted
SP
1997
IEEE
130views Security Privacy» more  SP 1997»
15 years 2 months ago
Execution Monitoring of Security-Critical Programs in Distributed Systems: A Specification-Based Approach
This paper describes a specification-based approach to detect exploitations of vulnerabdities in securitycritical programs. The approach utilizes security specifications that desc...
Calvin Ko, Manfred Ruschitzka, Karl N. Levitt
WCRE
2006
IEEE
15 years 4 months ago
How Programs Represent Reality (and how they don't)
Programming is modeling the reality. Most of the times, the mapping between source code and the real world concepts is captured implicitly in the names of identifiers. Making the...
Daniel Ratiu, Florian Deissenboeck
82
Voted
MICRO
2009
IEEE
132views Hardware» more  MICRO 2009»
15 years 4 months ago
Finding concurrency bugs with context-aware communication graphs
Incorrect thread synchronization often leads to concurrency bugs that manifest nondeterministically and are difficult to detect and fix. Past work on detecting concurrency bugs ...
Brandon Lucia, Luis Ceze
SAS
2009
Springer
147views Formal Methods» more  SAS 2009»
15 years 10 months ago
Polymorphic Fractional Capabilities
Abstract. The capability calculus is a framework for statically reasoning about program resources such as deallocatable memory regions. Fractional capabilities, originally proposed...
Hirotoshi Yasuoka, Tachio Terauchi