The internet worm program: an analysis
ACM SIGCOMM Computer Communication Review
Communications of the ACM
On Preventing Intrusions by Process Behavior Monitoring
Proceedings of the Workshop on Intrusion Detection and Network Monitoring
Using kernel hypervisors to secure applications
ACSAC '97 Proceedings of the 13th Annual Computer Security Applications Conference
Fault Tolerance for Off-the-Shelf Applications and Hardware
FTCS '95 Proceedings of the Twenty-Fifth International Symposium on Fault-Tolerant Computing
StackGuard: automatic adaptive detection and prevention of buffer-overflow attacks
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
Software security vulnerability testing in hostile environments
Proceedings of the 2002 ACM symposium on Applied computing
Taxonomy of security considerations and software quality
Communications of the ACM - E-services: a cornucopia of digital offerings ushers in the next Net-based evolution
Host-Based Security Challenges and Controls: A Survey of Contemporary Research
Information Security Journal: A Global Perspective
Hi-index | 0.00 |
Researchers at Telcordia Technologies and the State University of New York, Stony Brook, are working on an approach that gives computer users new capabilities for defending against exploitation of application security vulnerabilities by allowing rapid development and deployment of real-time defenses. Their solution involves monitoring and changing an application's behavior by intercepting the system calls it requests.