Search
Now showing items 1-1 of 1
Improving host-based computer security using secure active monitoring and memory analysis
(Georgia Institute of Technology, 2010-06-03)
Thirty years ago, research in designing operating systems to defeat malicious software was very popular. The primary technique was to design and implement a small security kernel that could provide security assurances to ...