Runtime Execution Monitoring (REM) to Detect and Prevent Malicious Code Execution

Source:

Proceedings of the International Conference on Computer Design (ICCD 2004), San Jose, California, USA, p.452-457 (2004)

URL:

http://palms.ee.princeton.edu/PALMSopen/fiskiran04runtime.pdf