Sciweavers

4 search results - page 1 / 1
» Ethical Proactive Threat Research
Sort
View
FC
2010
Springer
166views Cryptology» more  FC 2010»
13 years 6 months ago
Ethical Proactive Threat Research
John Aycock, John Sullins
DIMVA
2010
13 years 6 months ago
HookScout: Proactive Binary-Centric Hook Detection
Abstract. In order to obtain and maintain control, kernel malware usually makes persistent control flow modifications (i.e., installing hooks). To avoid detection, malware develope...
Heng Yin, Pongsin Poosankam, Steve Hanna, Dawn Xia...
NDSS
2007
IEEE
13 years 11 months ago
Army of Botnets
The trend toward smaller botnets may be more dangerous than large botnets, in terms of large-scale attacks like distributed denials of service. We examine the possibility of “su...
Ryan Vogt, John Aycock, Michael J. Jacobson Jr.
SIGUCCS
2000
ACM
13 years 8 months ago
Computer Abuse, Information Technologies and Judicial Affairs
Crime on the Internet has become a formidable challenge for university information technology and student judicial systems. The nature of university computing requires a relativel...
Elizabeth Mackenzie, Kathryn Goldman