Method and Apparatus Providing Deception and/or Altered Operation in an Information System Operating System
Abstract
A method and/or system and/or apparatus providing deception and/or execution alteration in an information system. In specific embodiments, deceptions and/or protections are provided by intercepting and/or modifying operation of one or more system calls of an operating system.
- Inventors:
-
- Livermore, CA
- Fremont, CA
- San Leandro, CA
- Publication Date:
- Research Org.:
- Lawrence Livermore National Laboratory (LLNL), Livermore, CA (United States)
- Sponsoring Org.:
- USDOE Office of Defense Programs (DP)
- OSTI Identifier:
- 953757
- Patent Number(s):
- 7,437,766
- Application Number:
- 10/679186
- Assignee:
- Sandia National Laboratories (Livermore, CA)
- Resource Type:
- Patent
- Country of Publication:
- United States
- Language:
- English
Citation Formats
Cohen, Fred, Rogers, Deanna T, and Neagoe, Vicentiu. Method and Apparatus Providing Deception and/or Altered Operation in an Information System Operating System. United States: N. p., 2008.
Web.
Cohen, Fred, Rogers, Deanna T, & Neagoe, Vicentiu. Method and Apparatus Providing Deception and/or Altered Operation in an Information System Operating System. United States.
Cohen, Fred, Rogers, Deanna T, and Neagoe, Vicentiu. 2008.
"Method and Apparatus Providing Deception and/or Altered Operation in an Information System Operating System". United States. https://www.osti.gov/servlets/purl/953757.
@article{osti_953757,
title = {Method and Apparatus Providing Deception and/or Altered Operation in an Information System Operating System},
author = {Cohen, Fred and Rogers, Deanna T and Neagoe, Vicentiu},
abstractNote = {A method and/or system and/or apparatus providing deception and/or execution alteration in an information system. In specific embodiments, deceptions and/or protections are provided by intercepting and/or modifying operation of one or more system calls of an operating system.},
doi = {},
url = {https://www.osti.gov/biblio/953757},
journal = {},
number = ,
volume = ,
place = {United States},
year = {Tue Oct 14 00:00:00 EDT 2008},
month = {Tue Oct 14 00:00:00 EDT 2008}
}
Save to My Library
You must Sign In or Create an Account in order to save documents to your library.
Works referenced in this record:
On the response policy of software decoys: Conducting software-based deception in the cyber battlespace
conference, January 2002
- Michael, J. B.
- Proceedings 26th Annual International Computer Software and Applications