Sciweavers

4307 search results - page 2 / 862
» Dynamic Spyware Analysis
Sort
View
CCS
2004
ACM
13 years 11 months ago
Web tap: detecting covert web traffic
As network security is a growing concern, system administrators lock down their networks by closing inbound ports and only allowing outbound communication over selected protocols ...
Kevin Borders, Atul Prakash
ICIG
2009
IEEE
14 years 8 days ago
Analysis and Evaluation of the ColorLogin Graphical Password Scheme
It is believed that graphical passwords are more memorable than traditional textual passwords, but usually seen as complex and time-consuming for users. Furthermore, most of the e...
Haichang Gao, Xiyang Liu, Ruyi Dai, Sidong Wang, X...
COMPSEC
2008
113views more  COMPSEC 2008»
13 years 5 months ago
Automated containment of rootkits attacks
Abstract-- Rootkit attacks are a serious threat to computer systems. Packaged with other malware such as worms, viruses and spyware, rootkits pose a more potent threat than ever be...
Arati Baliga, Liviu Iftode, Xiaoxin Chen
ACSAC
2006
IEEE
13 years 11 months ago
Foreign Code Detection on the Windows/X86 Platform
As new attacks against Windows-based machines emerge almost on a daily basis, there is an increasing need to “lock down” individual users’ desktop machines in corporate comp...
Susanta Nanda, Wei Li, Lap-Chung Lam, Tzi-cker Chi...