A Study for Task Detection Acquiring Abnormal Permission in Linux
暂无分享,去创建一个
Won-Il Kim | Sang-Hyun Yoo | Ju-Hyun Kwak | Chang-Hoon Lee | Ju-hyun Kwak | Chang-hoon Lee | Won-Il Kim | Sang-Hyun Yoo
[1] Amir-Massoud Bidgoli,et al. A Hybrid Feature Selection Method to Improve Performance of a Group of Classification Algorithms , 2013, ArXiv.
[2] Karen A. Scarfone,et al. Guide to Intrusion Detection and Prevention Systems (IDPS) , 2007 .
[3] Dhruwajita Devi,et al. Host-based Intrusion Detection and Prevention System (HIDPS) , 2013 .
[4] Carla E. Brodley,et al. SmashGuard: A Hardware Solution to Prevent Security Attacks on the Function Return Address , 2006, IEEE Transactions on Computers.
[5] Soo-Hyun Oh,et al. Detection Mechanism against Code Re-use Attack in Stack region , 2014 .
[6] Gerardo Richarte. Four dierent tricks to bypass StackShield and StackGuard protection , 2002, WWW 2002.
[7] R. M. Chandrasekaran,et al. Intrusion detection using neural based hybrid classification methods , 2011, Comput. Networks.
[8] Xuxian Jiang,et al. On the Expressiveness of Return-into-libc Attacks , 2011, RAID.
[9] Crispan Cowan,et al. StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks , 1998, USENIX Security Symposium.