作者: C. Ko , M. Ruschitzka , K. Levitt
DOI: 10.1109/SECPRI.1997.601332
关键词:
摘要: We describe a specification-based approach to detect exploitations of vulnerabilities in security-critical programs. The utilizes security specifications that the intended behavior programs and scans audit trails for operations are violation specifications. developed formal framework specifying security-relevant programs, on which we based design implementation real-time intrusion detection system distributed system. Also, wrote 15 Unix setuid root Our detects attacks caused by monitored including violations improper synchronization encompasses exploit previously unknown