메뉴 건너뛰기




Volumn , Issue , 2008, Pages 2283-2288

Dynamic trustiness authentication framework based on software's behavior integrity

Author keywords

Behavior integrity; Behavior trustiness; Dynamic trustiness; Function invoking

Indexed keywords

ACCESS CONTROL; APPLICATION PROGRAMMING INTERFACES (API); AUTHENTICATION; FUNCTIONS; PROBABILITY DENSITY FUNCTION; QUALITY ASSURANCE;

EID: 58349116044     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICYCS.2008.541     Document Type: Conference Paper
Times cited : (13)

References (12)
  • 2
    • 20444411497 scopus 로고    scopus 로고
    • Research on Trustworthy Networks
    • Ch
    • Lin Chuang, Peng Xuehai, "Research on Trustworthy Networks", Chinese Journal of Computers, 2005(5), pp. 751-758. (Ch)
    • (2005) Chinese Journal of Computers , Issue.5 , pp. 751-758
    • Lin, C.1    Peng, X.2
  • 3
    • 20144368816 scopus 로고    scopus 로고
    • Duan Yunsu, Liu Xin, Chen Zhong, Analysis on Combined Security Efficiency and Vulnerability for Information System Security Evaluation, Journal of Peking University(Natural Science Edition), 2005(3), pp. 484-490.(Ch).
    • Duan Yunsu, Liu Xin, Chen Zhong, "Analysis on Combined Security Efficiency and Vulnerability for Information System Security Evaluation", Journal of Peking University(Natural Science Edition), 2005(3), pp. 484-490.(Ch).
  • 4
    • 58349086732 scopus 로고    scopus 로고
    • Zhang Huanguo, Luo Jie, Jin Gang, Development of Trusted Computing Research, Journal of Wuhan University(Natural Science Edition), 2006(5), pp. 513-518. (Ch)
    • Zhang Huanguo, Luo Jie, Jin Gang, "Development of Trusted Computing Research", Journal of Wuhan University(Natural Science Edition), 2006(5), pp. 513-518. (Ch)
  • 6
    • 0032313923 scopus 로고    scopus 로고
    • A. Intrusion Detection Using Sequences of System Calls
    • Hofmeyr S, Forrest S, Somayaji, "A. Intrusion Detection Using Sequences of System Calls", Journal of Computer Security, 1998 (6), pp. 151-180.
    • (1998) Journal of Computer Security , vol.6 , pp. 151-180
    • Hofmeyr, S.1    Forrest, S.2    Somayaji3
  • 8
    • 0034829697 scopus 로고    scopus 로고
    • A fast automation-based method for detecting anomalous program behaviors
    • IEEE Computer Society, Washington, DC, USA
    • Sekar R., Bendre M., Dhurjati D., et al, "A fast automation-based method for detecting anomalous program behaviors", Proceedings of t he 2001 IEEE Symposium on Security and Privacy. IEEE Computer Society, Washington, DC, USA, 2001, pp. 144-149.
    • (2001) Proceedings of t he 2001 IEEE Symposium on Security and Privacy , pp. 144-149
    • Sekar, R.1    Bendre, M.2    Dhurjati, D.3
  • 9
    • 28344446955 scopus 로고    scopus 로고
    • Polymorphic Malicious Executable Scanner by API Sequence Analysis
    • Washington D C: IEEE Computer Society Press
    • Xu Jianyun, Sung Andrew H, Chavez Patrick, et al, "Polymorphic Malicious Executable Scanner by API Sequence Analysis", Fourth International Conference on Hybrid Intelligent Systems (HIS'04). Washington D C: IEEE Computer Society Press, 2004, pp. 378-383.
    • (2004) Fourth International Conference on Hybrid Intelligent Systems (HIS'04) , pp. 378-383
    • Sung, X.A.H.1    Patrick, C.2
  • 10
    • 84924223669 scopus 로고    scopus 로고
    • Static Analysis of Executables to Detect Malicious Patterns
    • Washington D C. Berkeley, pp
    • Christodorescu Mihai, Jha Somesh, "Static Analysis of Executables to Detect Malicious Patterns", Proceedings of the 12th USENIX Security Symposium, Washington D C. Berkeley, pp.169-186.
    • Proceedings of the 12th USENIX Security Symposium , pp. 169-186
    • Mihai, C.1    Somesh, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.