Detecting Manipulated Remote Call Streams

作者: Barton P. Miller , Somesh Jha , Jonathon T. Giffin

DOI:

关键词:

摘要:

参考文章(35)
Amin Vahdat, Michael Dahlin, Thomas Anderson, Eshwar Belani, The CRISIS wide area security architecture usenix security symposium. pp. 2- 2 ,(1998)
Frank Tip, A survey of program slicing techniques. Journal of Programming Languages. ,vol. 3, ,(1995)
Javier Esparza, David Hansel, Peter Rossmanith, Stefan Schwoon, Efficient Algorithms for Model Checking Pushdown Systems computer aided verification. pp. 232- 247 ,(2000) , 10.1007/10722167_20
Fred B. Schneider, Towards Fault-Tolerant and Secure Agentry international workshop on distributed algorithms. pp. 1- 14 ,(1997) , 10.1007/BFB0030670
Fritz Hohl, A Model of Attacks of Malicious Hosts Against Mobile Agents european conference on object-oriented programming. pp. 299- 299 ,(1998) , 10.1007/3-540-49255-0_77
Peter Sestoft, Neil D. Jones, Carsten K. Gomard, Partial evaluation and automatic program generation ,(1993)
Stanley Chow, Yuan Gu, Harold Johnson, Vladimir A. Zakharov, An Approach to the Obfuscation of Control-Flow of Sequential Computer Programs international conference on information security. ,vol. 2200, pp. 144- 155 ,(2001) , 10.1007/3-540-45439-X_10
Tomas Sander, Christian F. Tschudin, Protecting Mobile Agents Against Malicious Hosts Mobile Agents and Security. pp. 44- 60 ,(1998) , 10.1007/3-540-68671-1_4
Andrew W. Appel, David B. MacQueen, Standard ML of New Jersey international symposium on programming language implementation and logic programming. pp. 1- 13 ,(1991) , 10.1007/3-540-54444-5_83
Aaron Schwartzbard, Michael Schatz, Anup K. Ghosh, Learning program behavior profiles for intrusion detection ID'99 Proceedings of the 1st conference on Workshop on Intrusion Detection and Network Monitoring - Volume 1. pp. 6- 6 ,(1999)