نتایج جستجو برای: system call

تعداد نتایج: 2298490  

Journal: :International Journal of Computer Applications 2015

Journal: :IEEE Transactions on Communications 2001

نعمت‌اله ریاضی, ,

  The stepwise Sine-Gordon equation in which the value of the system parameter is different for negative and positive value of the scalar field is investigated. By applying appropriate junction conditions, the relation between solition velocities before and after collision is derived. It turns out that a heavy soliton anti-soliton pair can transform into a light pair moving at right velocities....

2007
Robert N. M. Watson

System call interposition allows the kernel security model to be extended. However, when combined with current operating systems, it is open to concurrency vulnerabilities leading to privilege escalation and audit bypass. We discuss the theory and practice of system call wrapper concurrency vulnerabilities, and demonstrate exploit techniques against GSWTK, Systrace, and CerbNG.

2000
Helen J. Wang Anthony D. Joseph Randy H. Katz

Because of the emergence of heterogeneous access devices and diverse wired and wireless networks, and a substantial lack of support for integrating these networks, we are building a communication network and a service infrastructure that provides integrated telephony and data services across these networks. We generalize the basic call service to support communication between two or more call p...

1992
Anil Somayaji Stephanie Forrest

Automated intrusion response is an important unsolved problem in computer security. A system called pH (for process homeostasis) is described which can successfully detect and stop intrusions before the target system is compromised. In its current form, pH monitors every executing process on a computer at the system-call level, and responds to anomalies by either delaying or aborting system cal...

Journal: :JSW 2007
Surekha Mariam Varghese K. Poulose Jacob

This paper discusses our research in developing a generalized and systematic method for anomaly detection. The key ideas are to represent normal program behaviour using system call frequencies and to incorporate probabilistic techniques for classification to detect anomalies and intrusions. Using experiments on the sendmail system call data, we demonstrate that concise and accurate classifiers ...

2004
XU Ming CHEN Chun YING Jing

The aim of this paper is to create a new anomaly detection model based on rules. A detailed classification of the LINUX system calls according to their function and level of threat is presented. The detection model only aims at critical calls (i.e. the threat level 1 calls). In the learning process, the detection model dynamically processes every critical call, but does not use data mining or s...

2003
Niels Provos

We introduce a system that eliminates the need to run programs in privileged process contexts. Using our system, programs run unprivileged but may execute certain operations with elevated privileges as determined by a configurable policy eliminating the need for suid or sgid binaries. We present the design and analysis of the “Systrace” facility which supports fine grained process confinement, ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید