Utilizing Binary Rewriting for Improving End-Host Security

2007 ◽  
Vol 18 (12) ◽  
pp. 1687-1699 ◽  
Author(s):  
Yougang Song ◽  
B.D. Fleisch
2003 ◽  
pp. 241-261
Author(s):  
Amanda Andress
Keyword(s):  

Author(s):  
William H. Hawkins ◽  
Jason D. Hiser ◽  
Michele Co ◽  
Anh Nguyen-Tuong ◽  
Jack W. Davidson
Keyword(s):  

2014 ◽  
Vol 635-637 ◽  
pp. 1628-1631
Author(s):  
Li Juan Zhuang

In the context of the rapid development of Internet technology, information security is particularly important, especially at present there is growing incidence of attack targeting at the host and a variety of attacking means, which does a lot of harm. To do preventive work well is to figure out what risks threatening the host and formulate timely and effective measures to protect the host.The first computer in the world came out in 1946 in the USA. With the birth of this computer, the computer technology of humankind has made spectacular development for more than the last half century and penetrated into all aspects of our lives till today. Compared with traditional means of communication, the Internet has greatly facilitated our lives, which led to the growing dependence on the Internet as well. While technology is a double-edged sword, the Internet information security is also very acute problem, which greatly troubles people’s work and life. As the most fundamental part of a computer system, the host security problem draws people’s attention in particular.


Author(s):  
Pádraig O’Sullivan ◽  
Kapil Anand ◽  
Aparna Kotha ◽  
Matthew Smithson ◽  
Rajeev Barua ◽  
...  
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document