Sciweavers

233 search results - page 24 / 47
» The Evolution of System-Call Monitoring
Sort
View
PERCOM
2010
ACM
13 years 8 months ago
iFall - a new embedded system for the detection of unexpected falls
—This paper describes a new embedded system, called iFall, for the detection of unexpected falls for elderly people. In combination with a new sensors system and the monitoring o...
Ralf Salomon, Martin Lüder, Gerald Bieber
SIGCOMM
2006
ACM
14 years 3 months ago
Jigsaw: solving the puzzle of enterprise 802.11 analysis
The combination of unlicensed spectrum, cheap wireless interfaces and the inherent convenience of untethered computing have made 802.11-based networks ubiquitous in the enterprise...
Yu-Chung Cheng, John Bellardo, Péter Benk&o...
DIMVA
2007
13 years 11 months ago
Characterizing Bots' Remote Control Behavior
A botnet is a collection of bots, each generally running on a compromised system and responding to commands over a “commandand-control” overlay network. We investigate observab...
Elizabeth Stinson, John C. Mitchell
ACSAC
2006
IEEE
14 years 3 months ago
How to Automatically and Accurately Sandbox Microsoft IIS
Comparing the system call sequence of a network application against a sandboxing policy is a popular approach to detecting control-hijacking attack, in which the attacker exploits...
Wei Li, Lap-Chung Lam, Tzi-cker Chiueh
ACSAC
2002
IEEE
14 years 2 months ago
Safe Virtual Execution Using Software Dynamic Translation
Safe virtual execution (SVE) allows a host computer system to reduce the risks associated with running untrusted programs. SVE prevents untrusted programs from directly accessing ...
Kevin Scott, Jack W. Davidson