Sciweavers

13 search results - page 1 / 3
» Detecting Kernel-Level Rootkits Through Binary Analysis
Sort
View
ACSAC
2004
IEEE
13 years 8 months ago
Detecting Kernel-Level Rootkits Through Binary Analysis
Christopher Krügel, William K. Robertson, Gio...
SIGDIAL
2010
13 years 2 months ago
Detection of time-pressure induced stress in speech via acoustic indicators
We use automatically extracted acoustic features to detect speech which is generated under stress, achieving 76.24% accuracy with a binary logistic regression. Our data are task-o...
Matthew Frampton, Sandeep Sripada, Ricardo Augusto...
CCS
2007
ACM
13 years 11 months ago
Polyglot: automatic extraction of protocol message format using dynamic binary analysis
Protocol reverse engineering, the process of extracting the application-level protocol used by an implementation, without access to the protocol specification, is important for m...
Juan Caballero, Heng Yin, Zhenkai Liang, Dawn Xiao...
RAID
2010
Springer
13 years 3 months ago
Detecting the Onset of Infection for Secure Hosts
Abstract. Software flaws in applications such as a browser may be exploited by attackers to launch drive-by-download (DBD), which has become the major vector of malware infection....
Kui Xu, Qiang Ma, Danfeng (Daphne) Yao
ACSAC
2005
IEEE
13 years 10 months ago
Countering Trusting Trust through Diverse Double-Compiling
An Air Force evaluation of Multics, and Ken Thompson’s famous Turing award lecture “Reflections on Trusting Trust,” showed that compilers can be subverted to insert maliciou...
David Wheeler