Security threats have escalated rapidly in the past decade. "Zero-day attacks," delivered via web pages, pictures or documents, have become significant threats. Malware is rampant, being installed using phishing, software vulnerability exploits, and software downloads. With the emergence of a lucrative black market in cyber crime, even ordinary users are becoming targets of sophisticated malware attacks. © 2011 IFIP International Federation for Information Processing.
CITATION STYLE
Sekar, R. (2011). Information flow containment: A practical basis for malware defense. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6818 LNCS, pp. 1–3). https://doi.org/10.1007/978-3-642-22348-8_1
Mendeley helps you to discover research relevant for your work.