System call

Known as: INT 0x80, Syscall, Call 
In computing, a system call is the programmatic way in which a computer program requests a service from the kernel of the operating system it is… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2011
Highly Cited
2011
Accurate, fine-grained online energy estimation and accounting of mobile devices such as smartphones is of critical importance to… (More)
  • figure 1
  • figure 2
  • figure 4
  • figure 3
  • table 1
Is this relevant?
Highly Cited
2010
Highly Cited
2010
For the past 30+ years, system calls have been the de facto interface used by applications to request services from the operating… (More)
  • figure 1
  • table 1
  • figure 2
  • figure 4
  • figure 3
Is this relevant?
Highly Cited
2006
Highly Cited
2006
Intrusion detection systems (IDSs) are used to detect traces of malicious activities targeted against the network and its… (More)
  • figure 1
  • figure 2
  • figure 3
  • table I
  • table II
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Application sandboxes provide restricted execution environments that limit an application’s access to sensitive OS resources… (More)
  • figure 2
  • figure 1
  • table 1
  • table 2
  • table 3
Is this relevant?
Highly Cited
2003
Highly Cited
2003
We introduce a system that eliminates the need to run programs in privileged process contexts. Using our system, programs run… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2003
Highly Cited
2003
System call interposition is a powerful method for regulating and monitoring application behavior. In recent years, a wide… (More)
  • figure 1
Is this relevant?
Highly Cited
2002
Highly Cited
2002
In the Internet, mobile code is ubiquitous and includes such examples as browser plug-ins, Java applets, and document m this… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2000
Highly Cited
2000
Automated intrusion response is an important unsolved problem in computer security. A system called pH (for process homeostasis… (More)
  • figure 1
  • figure 2
  • table 1
  • table 2
  • table 3
Is this relevant?
Highly Cited
1999
Highly Cited
1999
Intrusion detection systems rely on a wide variety of observable data to distinguish between legitimate and illegitimate… (More)
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
1998
Highly Cited
1998
A method is introducted for detecting intrusions at the level of privileged processes. Evidence is given that short sequences of… (More)
  • figure 1
  • table 1
  • table 2
  • table 3
  • table 4
Is this relevant?