Sciweavers

7 search results - page 1 / 2
» Privacy Invasive Software in File-Sharing Tools
Sort
View
IFIP11
2004
102views Business» more  IFIP11 2004»
13 years 6 months ago
Privacy Invasive Software in File-Sharing Tools
Andreas Jacobsson, Martin Boldt, Bengt Carlsson
ICSEA
2006
IEEE
13 years 10 months ago
Analysing Countermeasures Against Privacy-Invasive Software
User privacy is widely affected by the occurrence of privacy-invasive software (PIS) on the Internet. Various forms of countermeasures try to mitigate the negative effects caused b...
Martin Boldt, Bengt Carlsson
CCS
2007
ACM
13 years 11 months ago
Predicting vulnerable software components
Where do most vulnerabilities occur in software? Our Vulture tool automatically mines existing vulnerability databases and version archives to map past vulnerabilities to componen...
Stephan Neuhaus, Thomas Zimmermann, Christian Holl...
ACSAC
2010
IEEE
13 years 2 months ago
Fast and practical instruction-set randomization for commodity systems
Instruction-set randomization (ISR) is a technique based on randomizing the "language" understood by a system to protect it from code-injection attacks. Such attacks wer...
Georgios Portokalidis, Angelos D. Keromytis
CCS
2008
ACM
13 years 6 months ago
Ether: malware analysis via hardware virtualization extensions
Malware has become the centerpiece of most security threats on the Internet. Malware analysis is an essential technology that extracts the runtime behavior of malware, and supplie...
Artem Dinaburg, Paul Royal, Monirul I. Sharif, Wen...