Improving operating systems security: two case studies
Malicious attacks on computer systems attempt to obtain and maintain illicit control over the victim system. To obtain unauthorized access, they often exploit vulnerabilities in the victim system, and to maintain illicit control, they apply various hiding techniques to remain stealthy. In this dis...
Main Author: | |
---|---|
Published: |
Georgia Institute of Technology
2010
|
Subjects: | |
Online Access: | http://hdl.handle.net/1853/31849 |