Login / Signup
Protecting Against Unexpected System Calls.
Cullen Linn
Mohan Rajagopalan
Scott Baker
Christian S. Collberg
Saumya K. Debray
John H. Hartman
Published in:
USENIX Security Symposium (2005)
Keyphrases
</>
access control
case study
search algorithm
information technology
special case