Now showing items 1-2 of 2
Unearthing Stealthy Program Attacks Buried in Extremely Long Execution Paths
Modern stealthy exploits can achieve attack goals without introducing illegal control flows, e.g., tampering with noncontrol data and waiting for the modified data to propagate and alter the control flow legally. Existing ...
Intrusion Detection System for Applications using Linux Containers
Linux containers are gaining increasing traction in both individual and industrial use, and as these containers get integrated into mission-critical systems, real-time detection of malicious cyber attacks becomes a critical ...