|
Volumn 3224, Issue , 2004, Pages 1-20
|
Automatic extraction of accurate application-specific sandboxing policy
|
Author keywords
Intrusion detection; Mimicry attack; Non deterministic finite state automaton; Sandboxing; System call graph
|
Indexed keywords
APPLICATION PROGRAMS;
MERCURY (METAL);
MONITORING;
SEMANTICS;
SERVERS;
THROUGHPUT;
APPLICATION BEHAVIOR MODELS;
APPLICATION-SPECIFIC SYSTEMS;
DETERMINISTIC FINITE STATE AUTOMATA;
INTRUSION DETECTION SYSTEMS;
MIMICRY ATTACK;
SANDBOXING;
SYSTEM CALL MONITORING;
SYSTEM CALLS;
INTRUSION DETECTION;
|
EID: 35048824326
PISSN: 03029743
EISSN: 16113349
Source Type: Book Series
DOI: 10.1007/978-3-540-30143-1_1 Document Type: Article |
Times cited : (14)
|
References (24)
|