Back to Results
First PageMeta Content
Application programming interfaces / C POSIX library / Process / Linux kernel / Kernel / System call / Operating system / Thread / Fork / Computing / Software / System software


User-Level Infrastructure for System Call Interposition: A Platform for Intrusion Detection and Confinement K. Jain Iowa State University Ames, IA[removed]removed]
Add to Reading List

Document Date: 2003-11-09 13:16:42


Open Document

File Size: 114,18 KB

Share Result on Facebook

Currency

pence / USD / /

/

Facility

R. Sekar State University of New York Stony Brook / /

IndustryTerm

interposition infrastructure / malicious applications / system-call interposition infrastructure / kernel-resident software development / system call interception/extension infrastructure / user-level software development / intrusion detection/confinement systems / exploit software errors / networked computing systems / interception infrastructure / runtime support infrastructure / confinement systems / system-call intensive applications / security-related applications / system call extension infrastructure / user-level infrastructure / disk-intensive applications / syscall exit processing / helper applications / entry processing int 0x80 / syscall processing / entry processing code wakes / /

OperatingSystem

UNIX / Solaris / Linux / IRIX / System V Release / OSF/1 / Solaris operating system / /

Organization

R. Sekar State University of New York Stony Brook / Defense Advanced Research Agency’s Information Technology Office / Iowa State University / Information Technology Office / /

/

Position

supervisor / Monitoring process Supervisor / /

ProgrammingLanguage

C++ / /

ProvinceOrState

New York / Iowa / /

PublishedMedium

the C / /

Technology

mpeg / Linux / UNIX / Information Technology / API / data encryption / UNIX operating system / operating system / operating systems / process control / /

SocialTag