On Tue, 2008-06-10 at 17:16 -0400, Hira Agrawal wrote:
> Our approach involves examining "events" that get generated as a side 
> effect of normal call processing and analyzing them, or some appropriate 
> transformations of those events, against "normal", expected application 
> behavior.

so its like systrace.org?  A free open source security tool that lets
you filter system calls limiting what can be called, which arguments are
valid, how many times a particular thing can be called, what sections of
the filesystem are allowed, etc?

-- 
Trixter http://www.0xdecafbad.com     Bret McDanel
Belfast +44 28 9099 6461        US +1 516 687 5200
http://www.trxtel.com the phone company that pays you!


_______________________________________________
--Bandwidth and Colocation Provided by http://www.api-digital.com--

asterisk-biz mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-biz

Reply via email to