Secure coprocessor-based intrusion detection
暂无分享,去创建一个
Trent Jaeger | Xiaolan Zhang | Leendert van Doorn | Ronald Perez | Reiner Sailer | R. Sailer | Trent Jaeger | R. Perez | L. V. Doorn | Xiaolan Zhang | T. Jaeger
[1] Rodham E. Tulloss,et al. The Test Access Port and Boundary Scan Architecture , 1990 .
[2] Eugene H. Spafford,et al. Experiences with Tripwire: Using Integrity Checkers for Intrusion Detection , 1994 .
[3] Stephanie Forrest,et al. A sense of self for Unix processes , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[4] Vern Paxson,et al. Bro: a system for detecting network intruders in real-time , 1998, Comput. Networks.
[5] Steve H. Weingart,et al. Validating a High-Performance , Programmable Secure Coprocessor , 1999 .
[6] Sean W. Smith,et al. Building a high-performance, programmable secure coprocessor , 1999, Comput. Networks.
[7] Sean W. Smith,et al. Application Support Architecture for a High-Performance, Programmable Secure Coprocessor , 1999 .
[8] Massimo Bernaschi,et al. Operating system enhancements to prevent the misuse of system calls , 2000, CCS.
[9] Yin Zhang,et al. Detecting Backdoors , 2000, USENIX Security Symposium.
[10] Yin Zhang,et al. Detecting Stepping Stones , 2000, USENIX Security Symposium.
[11] Sean W. Smith,et al. Building the IBM 4758 Secure Coprocessor , 2001, Computer.
[12] Eugene H. Spafford,et al. Using internal sensors for computer intrusion detection , 2001 .
[13] David A. Wagner,et al. Intrusion detection via static analysis , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[14] Pau-Chen Cheng,et al. BlueBoX: A policy-driven, host-based intrusion detection system , 2003, TSEC.