Sciweavers

15 search results - page 1 / 3
» Hypervisor Support for Identifying Covertly Executing Binari...
Sort
View
USS
2008
13 years 7 months ago
Hypervisor Support for Identifying Covertly Executing Binaries
Hypervisors have been proposed as a security tool to defend against malware that subverts the OS kernel. However, hypervisors must deal with the semantic gap between the low-level...
Lionel Litty, H. Andrés Lagar-Cavilla, Davi...
ICC
2007
IEEE
141views Communications» more  ICC 2007»
13 years 11 months ago
A Hybrid Model to Detect Malicious Executables
— We present a hybrid data mining approach to detect malicious executables. In this approach we identify important features of the malicious and benign executables. These feature...
Mohammad M. Masud, Latifur Khan, Bhavani M. Thurai...
WISEC
2010
ACM
14 years 5 days ago
Timing-based localization of in-band wormhole tunnels in MANETs
The problem of localizing in-band wormhole tunnels in MANETs is considered. In an in-band wormhole attack, colluding attackers use a covert tunnel to create the illusion that two ...
Jinsub Kim, Dan Sterne, Rommie Hardy, Roshan K. Th...
EUROSYS
2008
ACM
14 years 2 months ago
Eudaemon: involuntary and on-demand emulation against zero-day exploits
Eudaemon is a technique that aims to blur the borders between protected and unprotected applications, and brings together honeypot technology and end-user intrusion detection and ...
Georgios Portokalidis, Herbert Bos
ICDE
2009
IEEE
165views Database» more  ICDE 2009»
14 years 7 months ago
Expressive Location-Based Continuous Query Evaluation with Binary Decision Diagrams
Many location-based services require rich and expressive query language support for filtering large amounts of information. In prominent location-based services thousands of conti...
Zhengdao Xu, Hans-Arno Jacobsen