Improving operating systems security: two case studies

Malicious attacks on computer systems attempt to obtain and maintain illicit control over the victim system. To obtain unauthorized access, they often exploit vulnerabilities in the victim system, and to maintain illicit control, they apply various hiding techniques to remain stealthy. In this dis...

Full description

Bibliographic Details
Main Author: Wei, Jinpeng
Published: Georgia Institute of Technology 2010
Subjects:
Online Access:http://hdl.handle.net/1853/31849