Logging to the Danger Zone: Race Condition Attacks and Defenses on System Audit Frameworks.
Riccardo PaccagnellaKevin LiaoDave TianAdam BatesPublished in: CCS (2020)
Keyphrases
- denial of service attacks
- dos attacks
- denial of service
- sufficient conditions
- countermeasures
- traffic analysis
- intrusion detection
- spam filters
- network security
- data mining techniques
- main memory databases
- spam filtering
- machine learning systems
- data corruption
- data sets
- malicious attacks
- security threats
- cyber attacks
- evaluation methods
- watermarking scheme
- information systems
- machine learning