Sign in

Validating the Integrity of Audit Logs Against Execution Repartitioning Attacks.

Carter YagemannMohammad A. NoureddineWajih Ul HassanSimon ChungAdam BatesWenke Lee
Published in: CCS (2021)
Keyphrases
  • execution traces
  • countermeasures
  • intrusion detection
  • log analysis
  • execution model
  • malicious attacks
  • attack detection
  • web services
  • traffic analysis