Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, A., Peterson, J., Sparks, R., Handley, M., Schooler, ... Caballero, J., Venkataraman, S., Poosankam, P., Kang, M.G., Song, D., Blum, A.: FiG: Automatic Fingerprint Generation.
Lee, W., Stolfo, S., Mok, K.: A data mining framework for building intrusion detection models. In: Proceedings of the IEEE Symposium on ... Wagner, D., Dean, D.: Intrusion detection via static analysis. In: Proceedings of the IEEE ...
Backtracker [19] reconstructs the sequence of steps that occurred in an intrusion by using intrusion alerts to initiate construction ofeventdependency graphs. In a similar way, Pyren ́ee uses NIDS alerts to initiate discovery ...
... shadow call stack must be maintained in a protected memory, so that the attacker cannot modify it. In our case, the shadow call stack is maintained on the host side, in userland, which is assumed to be trusted. The shadow stack is ...
... FUTo deletes the hidden process from the other three kernel structures: kernel handle table list, handle table of the ... the FUTo source. It seems that the definition of EPROCESS structure has changed over the Windows versions and the ...
... detection, and detail the design, implementation and performance of a system for dynamically monitoring the behavioral distance of diverse replicas. We detail our measure of behavioral distance and our method for divining the correlated ...