PsycoTrace: Virtual and Transparent Monitoring of a Process Self
暂无分享,去创建一个
[1] Jun Xu,et al. Non-Control-Data Attacks Are Realistic Threats , 2005, USENIX Security Symposium.
[2] David A. Wagner,et al. Mimicry attacks on host-based intrusion detection systems , 2002, CCS '02.
[3] Tzi-cker Chiueh,et al. Accurate and Automated System Call Policy-Based Intrusion Prevention , 2006, International Conference on Dependable Systems and Networks (DSN'06).
[4] David A. Wagner,et al. Intrusion detection via static analysis , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[5] Somesh Jha,et al. Detecting Manipulated Remote Call Streams , 2002, USENIX Security Symposium.
[6] James R. Larus,et al. Mining specifications , 2002, POPL '02.
[7] Sandeep Bhatkar,et al. Improving Attack Detection in Host-Based IDS by Learning Properties of System Call Arguments , 2005 .
[8] Stephen McCamant,et al. The Daikon system for dynamic detection of likely invariants , 2007, Sci. Comput. Program..
[9] Tal Garfinkel,et al. A Virtual Machine Introspection Based Architecture for Intrusion Detection , 2003, NDSS.
[10] Andrew Warfield,et al. Xen and the art of virtualization , 2003, SOSP '03.
[11] Somesh Jha,et al. Efficient Context-Sensitive Intrusion Detection , 2004, NDSS.
[12] Somesh Jha,et al. Formalizing sensitivity in static analysis for intrusion detection , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[13] Massimo Bernaschi,et al. Operating system enhancements to prevent the misuse of system calls , 2000, CCS.
[14] Weibo Gong,et al. Anomaly detection using call stack information , 2003, 2003 Symposium on Security and Privacy, 2003..