Affiliation:
1. Northeastern University, Boston, MA
Abstract
Our
Application Security Monitor
(ASM) is a run-time monitor that dynamically collects execution-related data. ASM is part of a security framework that will allow us to explore different security policies aimed at identifying malicious behavior such as Trojan horses and backdoors
.
In this paper, we show what type of data ASM can collect and illustrate how this data can be used to enforce a security policy. Using ASM we are able to explore different tradeoffs between security and performance
.
Publisher
Association for Computing Machinery (ACM)
Reference16 articles.
1. A lattice model of secure information flow
2. History-based access control for mobile code
3. LURHQ Threat Intelligence Group. Lurhq. http://www.lurhq.com/phatbot.html. LURHQ Threat Intelligence Group. Lurhq. http://www.lurhq.com/phatbot.html.
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Mining Bluetooth Attacks in Smart Phones;Networked Digital Technologies;2010
2. A Multi-core Security Architecture Based on EFI;On the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE, GADA, and IS