Sign Up to like & get
recommendations!
1
Published in 2018 at "Arabian Journal for Science and Engineering"
DOI: 10.1007/s13369-017-2828-0
Abstract: The extensive use of smartphones and increased popularity of Android operating system have proliferated in malware attacks. In order to overcome these malicious attacks, numerous malware detectors are now available and have been described in…
read more here.
Keywords:
system;
system call;
call based;
malware detector ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2024 at "IEEE Access"
DOI: 10.1109/access.2024.3486772
Abstract: With the rapid adoption of cloud environments, container technology has become crucial for the efficient operation of large-scale applications. Although container technology offers high efficiency and scalability through low-level isolation via shared host operating systems,…
read more here.
Keywords:
system;
call filtering;
system call;
call policies ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2025 at "IEEE Transactions on Cloud Computing"
DOI: 10.1109/tcc.2025.3583414
Abstract: Container technology in cloud computing has improved resource utilization and deployment efficiency, but it also introduces new security risks. Excessive privileges in containerized environments can allow attackers to exploit insufficiently restricted system calls, potentially leading…
read more here.
Keywords:
system;
system call;
security;
container ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2021 at "IEEE Transactions on Dependable and Secure Computing"
DOI: 10.1109/tdsc.2021.3069715
Abstract: In this paper, we present a novel fault injection framework for system call invocation errors, called Phoebe. Phoebe is unique as follows; First, Phoebe enables developers to have full observability of system call invocations. Second,…
read more here.
Keywords:
phoebe;
system;
injection;
system call ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2025 at "IEEE Transactions on Services Computing"
DOI: 10.1109/tsc.2025.3577497
Abstract: Invoking system calls in exploit implementation is a typical approach to compromising a system. A key objective of these attacks is to manipulate program execution paths, with a specific focus on invoking targeted system calls.…
read more here.
Keywords:
system;
system call;
context aware;
aware system ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2024 at "Journal of Cloud Computing"
DOI: 10.1186/s13677-024-00639-3
Abstract: While container adoption has witnessed significant growth in facilitating the operation of large-scale applications, this increased attention has also attracted adversaries who exploit numerous vulnerabilities present in contemporary containers. Unfortunately, existing security solutions largely overlooked…
read more here.
Keywords:
system;
call filtering;
system call;
association ... See more keywords