Sciweavers

4 search results - page 1 / 1
» How to Avoid Obfuscation Using Witness PRFs
Sort
View
BWCCA
2010
13 years 4 months ago
Malware Obfuscation Techniques: A Brief Survey
As the obfuscation is widely used by malware writers to evade antivirus scanners, so it becomes important to analyze how this technique is applied to malwares. This paper explores ...
Ilsun You, Kangbin Yim
RECSYS
2009
ACM
14 years 2 months ago
Effective diverse and obfuscated attacks on model-based recommender systems
Robustness analysis research has shown that conventional memory-based recommender systems are very susceptible to malicious profile-injection attacks. A number of attack models h...
Zunping Cheng, Neil Hurley
CEAS
2004
Springer
14 years 2 months ago
Stopping Spam by Extrusion Detection
End users are often unaware that their systems have been compromised and are being used to send bulk unsolicited email (spam). We show how automated processing of the email logs re...
Richard Clayton
MSR
2009
ACM
14 years 3 months ago
The promises and perils of mining git
We are now witnessing the rapid growth of decentralized source code management (DSCM) systems, in which every developer has her own repository. DSCMs facilitate a style of collabo...
Christian Bird, Peter C. Rigby, Earl T. Barr, Davi...