ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
1
views
0
references
Top references
cited by
3
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
2,218
similar
All similar
Record
: found
Abstract
: not found
Article
: not found
Using dynamic information flow analysis to detect attacks against applications
Author(s):
Wes Masri
,
Andy Podgurski
Publication date:
2005
Journal:
Proceedings of the 2005 workshop on Software engineering for secure systems---building trustworthy applications - SESS '05
Read this article at
ScienceOpen
Publisher
Bookmark
There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Big Data Privacy
Author and article information
Journal
DOI::
10.1145/1083200.1083216
ScienceOpen disciplines:
Computer science
,
Security & Cryptology
Data availability:
ScienceOpen disciplines:
Computer science
,
Security & Cryptology
Comments
Comment on this article
Sign in to comment
scite_
Similar content
2,218
Interest Flooding Attacks in Named Data Networking: Survey of Existing Solutions, Open Issues, Requirements, and Future Directions
Authors:
Ahmed Benmoussa
,
Chaker Abdelaziz Kerrache
,
Nasreddine Lagraa
…
CFH exerts anti-oxidant effects on retinal pigment epithelial cells independently from protecting against membrane attack complex
Authors:
Céline Borras
,
Jérémie Canonica
,
Sylvie Jorieux
…
Detection of False Data Injection Attack in Smart Grid via Adaptive Kalman Filtering
Authors:
See all similar
Cited by
3
Using opcode sequences in single-class learning to detect unknown malware
Authors:
I. Santos
,
F. Brezo
,
B Sanz
…
An Empirical Study of Test Case Filtering Techniques Based on Exercising Information Flows
Authors:
Wes Masri
,
Andy Podgurski
,
David Agustín León
A New Generic Taxonomy on Hybrid Malware Detection Technique
Authors:
S. Rahayu
,
Y. Robiah
,
R. Marliza
…
See all cited by