skip to main content
OSTI.GOV title logo U.S. Department of Energy
Office of Scientific and Technical Information

Title: Method and Apparatus Providing Deception and/or Altered Operation in an Information System Operating System

Abstract

A method and/or system and/or apparatus providing deception and/or execution alteration in an information system. In specific embodiments, deceptions and/or protections are provided by intercepting and/or modifying operation of one or more system calls of an operating system.

Inventors:
 [1];  [2];  [3]
  1. Livermore, CA
  2. Fremont, CA
  3. San Leandro, CA
Publication Date:
Research Org.:
Lawrence Livermore National Laboratory (LLNL), Livermore, CA (United States)
Sponsoring Org.:
USDOE Office of Defense Programs (DP)
OSTI Identifier:
953757
Patent Number(s):
7,437,766
Application Number:
10/679186
Assignee:
Sandia National Laboratories (Livermore, CA)
Resource Type:
Patent
Country of Publication:
United States
Language:
English

Citation Formats

Cohen, Fred, Rogers, Deanna T, and Neagoe, Vicentiu. Method and Apparatus Providing Deception and/or Altered Operation in an Information System Operating System. United States: N. p., 2008. Web.
Cohen, Fred, Rogers, Deanna T, & Neagoe, Vicentiu. Method and Apparatus Providing Deception and/or Altered Operation in an Information System Operating System. United States.
Cohen, Fred, Rogers, Deanna T, and Neagoe, Vicentiu. 2008. "Method and Apparatus Providing Deception and/or Altered Operation in an Information System Operating System". United States. https://www.osti.gov/servlets/purl/953757.
@article{osti_953757,
title = {Method and Apparatus Providing Deception and/or Altered Operation in an Information System Operating System},
author = {Cohen, Fred and Rogers, Deanna T and Neagoe, Vicentiu},
abstractNote = {A method and/or system and/or apparatus providing deception and/or execution alteration in an information system. In specific embodiments, deceptions and/or protections are provided by intercepting and/or modifying operation of one or more system calls of an operating system.},
doi = {},
url = {https://www.osti.gov/biblio/953757}, journal = {},
number = ,
volume = ,
place = {United States},
year = {Tue Oct 14 00:00:00 EDT 2008},
month = {Tue Oct 14 00:00:00 EDT 2008}
}

Works referenced in this record:

On the response policy of software decoys: Conducting software-based deception in the cyber battlespace
conference, January 2002