HH Feng, OM Kolesnikov, P Fogla… - 2003 Symposium on …, 2003 - ieeexplore.ieee.org
The call stack of a program execution can be a very good information source for intrusion
detection. There is no prior work on dynamically extracting information from the call stack …