Login / Signup
Validating the Integrity of Audit Logs Against Execution Repartitioning Attacks.
Carter Yagemann
Mohammad A. Noureddine
Wajih Ul Hassan
Simon Chung
Adam Bates
Wenke Lee
Published in:
CCS (2021)
Keyphrases
</>
execution traces
countermeasures
intrusion detection
log analysis
execution model
malicious attacks
attack detection
web services
traffic analysis