Experimenting with system and Libc call interception attacks on ARM-based Linux kernel.
Hyeong-chan LeeChung Hui KimJeong Hyun YiPublished in: SAC (2011)
Keyphrases
- linux kernel
- operating system
- source code
- clone detection
- software systems
- security mechanisms
- analysis tool
- countermeasures
- file system
- open source
- software evolution
- security protocols
- malicious attacks
- machine learning
- security threats
- traffic analysis
- malicious users
- software projects
- database
- security risks
- denial of service attacks