咨询与建议

限定检索结果

文献类型

  • 1 篇 会议

馆藏范围

  • 1 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1 篇 工学
    • 1 篇 电气工程
    • 1 篇 电子科学与技术(可...
    • 1 篇 计算机科学与技术...

主题

  • 1 篇 instruction cach...
  • 1 篇 cache storage
  • 1 篇 runtime executio...
  • 1 篇 program code ver...
  • 1 篇 block level
  • 1 篇 malicious code e...
  • 1 篇 victim computer
  • 1 篇 computer securit...
  • 1 篇 program code
  • 1 篇 keyed message au...
  • 1 篇 hashing
  • 1 篇 message authenti...
  • 1 篇 unauthorized for...
  • 1 篇 program verifica...
  • 1 篇 file organisatio...
  • 1 篇 spyware
  • 1 篇 legal executions
  • 1 篇 program flow ano...
  • 1 篇 memory architect...

机构

  • 1 篇 princeton univ d...

作者

  • 1 篇 lee rb
  • 1 篇 fiskiran am

语言

  • 1 篇 英文
检索条件"主题词=unauthorized foreign code"
1 条 记 录,以下是1-10 订阅
排序:
Runtime execution monitoring (REM) to detect and prevent malicious code execution
Runtime execution monitoring (REM) to detect and prevent mal...
收藏 引用
IEEE International Conference on Computer Design
作者: Fiskiran, AM Lee, RB Princeton Univ Dept Elect Engn Princeton NJ 08544 USA
Many computer security threats involve execution of unauthorized foreign code on the victim computer. Viruses, network and email worms, Trojan horses, backdoor programs used in Denial of Service attacks are a few exam... 详细信息
来源: 评论