7 papers:
- CASE-2015-HaseliradN #3d #novel
- A novel Kinect-based system for 3D moving object interception with a 5-DOF robotic arm (AH, JN), pp. 117–124.
- EDOC-2011-BalinskyPS #framework
- System Call Interception Framework for Data Leak Prevention (HB, DSP, SJS), pp. 139–148.
- OOPSLA-2011-VerwaestBLN #flexibility #lightweight
- Flexible object layouts: enabling lightweight language extensions by intercepting slot access (TV, CB, ML, ON), pp. 959–972.
- SAC-2011-LeeKY #kernel #linux
- Experimenting with system and Libc call interception attacks on ARM-based Linux kernel (HcL, CHK, JHY), pp. 631–632.
- ICST-2011-RubanovS #kernel #linux #runtime #verification
- Runtime Verification of Linux Kernel Modules Based on Call Interception (VVR, EAS), pp. 180–189.
- ECIR-2009-Ailon #algorithm #linear #query #ranking #using
- A Simple Linear Ranking Algorithm Using Query Dependent Intercept Variables (NA), pp. 685–690.
- TOOLS-EUROPE-1992-McCue #c++
- Intercepting Fecht and Store Operations in C++ (DLM), pp. 275–282.