메뉴 건너뛰기




Volumn , Issue , 2005, Pages 43-54

Anomalous path detection with hardware support

Author keywords

Anomalous Path; Anomaly Detection; Control Flow Monitoring; Hardware Support; Monitoring Granularity

Indexed keywords

COMPUTER HARDWARE; COMPUTER SOFTWARE; REAL TIME SYSTEMS;

EID: 29144462647     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1086297.1086305     Document Type: Conference Paper
Times cited : (53)

References (26)
  • 7
    • 0031233430 scopus 로고    scopus 로고
    • Intrusion detection via system call traces
    • A.Kosoresow, S.Hofmeyr, "Intrusion Detection via System Call Traces," IEEE Software, vol. 14, pp. 24-42, 1997.
    • (1997) IEEE Software , vol.14 , pp. 24-42
    • Kosoresow, A.1    Hofmeyr, S.2
  • 9
    • 85084160767 scopus 로고    scopus 로고
    • On gray-box program tracking for anomaly detection
    • August
    • Debin Gao, Michael K. Reiter, Dawn Song, "On Gray-Box Program Tracking for Anomaly Detection", 13th USENIX Security Symposium, pages 103-118, August 2004
    • (2004) 13th USENIX Security Symposium , pp. 103-118
    • Gao, D.1    Reiter, M.K.2    Song, D.3
  • 10
    • 14844297052 scopus 로고    scopus 로고
    • Gray-box extraction of execution graphs for anomaly detection
    • October
    • Debin Gao, Michael K. Reiter and Dawn Song, "Gray-Box Extraction of Execution Graphs for Anomaly Detection", the 11th ACM CCS conf., pages 318-329, October 2004.
    • (2004) The 11th ACM CCS Conf. , pp. 318-329
    • Gao, D.1    Reiter, M.K.2    Song, D.3
  • 12
    • 29144513759 scopus 로고    scopus 로고
    • Hardware supported anomaly detection: Down to the control flow level
    • Tao Zhang, Xiaotong Zhuang, Santosh Pande, Wenke Lee, "Hardware Supported Anomaly Detection: down to the Control Flow Level," Technical Report GIT-CERCS-04-11.
    • Technical Report , vol.GIT-CERCS-04-11
    • Zhang, T.1    Zhuang, X.2    Pande, S.3    Lee, W.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.