Efficient Anomaly Detection System for Mobile Handsets
暂无分享,去创建一个
Kazuhiko Kato | Hirotake Abe | Takahiro Shinagawa | Satoshi Kawasaki | Masaji Katagiri | Yuka Ikebe | Takehiro Nakayama
[1] R. Sekar,et al. A practical mimicry attack against powerful system-call monitors , 2008, ASIACCS '08.
[2] R. Sekar,et al. A fast automaton-based method for detecting anomalous program behaviors , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[3] David A. Wagner,et al. Mimicry attacks on host-based intrusion detection systems , 2002, CCS '02.
[4] Weibo Gong,et al. Anomaly detection using call stack information , 2003, 2003 Symposium on Security and Privacy, 2003..
[5] Stephanie Forrest,et al. Intrusion Detection Using Sequences of System Calls , 1998, J. Comput. Secur..