A practical mimicry attack against powerful system-call monitorsJan 1, 2008·Chetan Parampalli,R Sekar,Rob Johnson· 0 min read CiteTypeConference paperPublicationProceedings of the 2008 ACM symposium on Information, computer and communications securityLast updated on Jan 1, 2008 ← Methods, apparatus, and program products for inferring service usage Apr 1, 2008Flow-Insensitive Type Qualifiers Jan 1, 2008 →