Author:
Otsubo Nobuto,Uemura Shinichiro,Yamauchi Toshihiro,Taniguchi Hideo
Reference6 articles.
1. Japan Network Security Association (2008) Information Security Incident Survey Report,
http://www.jnsa.org/result/incident/data/2008incident_survey_e_v1.0.pdf
2. Tabata T, Hakomori S, Ohashi K, Uemura S, Yokoyama K, Taniguchi H (2009) Tracing classified information diffusion for protecting information leakage. IPSJ J 50(9):2088–2012 (in Japanese)
3. Kim CH, Keromytis DA, Covington M, Sahita R (2009) Capturing information flow with concatenated dynamic taint analysis. 2009 International conference on Availability, Reliability and Security (ARES 2009), pp 355–362
4. Zavou A, Portokalidis G, Keromytis DA (2011) Taint-Exchange: A generic system for cross-process and cross-host taint tracking. The 6th International Workshop on Security (IWSEC 2011), vol 7038. LNCS, pp 113–128
5. Garnkel T, Pfaff B, Chow J, Rosenblum M, Boneh D (2003) Terra: A virtual machine-based platform for trusted computing. In: Proceedings of 19th ACM SIGOPS Symposium on Operating System Principles (SOSP 2003), pp 193–206
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献