Sciweavers

133 search results - page 3 / 27
» Securing Systems Against External Programs
Sort
View
CN
2007
137views more  CN 2007»
13 years 6 months ago
Defending against hitlist worms using network address space randomization
Worms are self-replicating malicious programs that represent a major security threat for the Internet, as they can infect and damage a large number of vulnerable hosts at timescal...
Spyros Antonatos, Periklis Akritidis, Evangelos P....
ACSAC
2008
IEEE
14 years 22 days ago
The Evolution of System-Call Monitoring
Computer security systems protect computers and networks from unauthorized use by external agents and insiders. The similarities between computer security and the problem of prote...
Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaj...
SIGMOD
2004
ACM
116views Database» more  SIGMOD 2004»
14 years 6 months ago
The Role of Cryptography in Database Security
In traditional database security research, the database is usually assumed to be trustworthy. Under this assumption, the goal is to achieve security against external attacks (e.g....
Ueli M. Maurer
ACSAC
2003
IEEE
13 years 11 months ago
Honeypots: Catching the Insider Threat
In the past several years there has been extensive research into honeypot technologies, primarily for detection and information gathering against external threats. However, little...
Lance Spitzner
EUROSYS
2008
ACM
14 years 3 months ago
Eudaemon: involuntary and on-demand emulation against zero-day exploits
Eudaemon is a technique that aims to blur the borders between protected and unprotected applications, and brings together honeypot technology and end-user intrusion detection and ...
Georgios Portokalidis, Herbert Bos