Search
Now showing items 1-2 of 2
Understanding and protecting closed-source systems through dynamic analysis
(Georgia Institute of Technology, 2014-08-22)
In this dissertation, we focus on dynamic analyses that examine the data handled by programs and operating systems in order to divine the undocumented constraints and implementation details that determine their behavior ...
Improving host-based computer security using secure active monitoring and memory analysis
(Georgia Institute of Technology, 2010-06-03)
Thirty years ago, research in designing operating systems to defeat malicious software was very popular. The primary technique was to design and implement a small security kernel that could provide security assurances to ...