Sciweavers

11 search results - page 1 / 3
» dimva 2009
Sort
View
DIMVA
2009
13 years 6 months ago
How Good Are Malware Detectors at Remediating Infected Systems?
Emanuele Passerini, Roberto Paleari, Lorenzo Marti...
DIMVA
2009
13 years 6 months ago
Towards Proactive Spam Filtering (Extended Abstract)
Jan Göbel, Thorsten Holz, Philipp Trinius
DIMVA
2009
13 years 6 months ago
Selecting and Improving System Call Models for Anomaly Detection
Alessandro Frossi, Federico Maggi, Gian Luigi Rizz...
DIMVA
2009
13 years 6 months ago
On the Effectiveness of Software Diversity: A Systematic Study on Real-World Vulnerabilities
Abstract. Many systems have been introduced to detect software intrusions by comparing the outputs and behavior of diverse replicas when they are processing the same, potentially m...
Jin Han, Debin Gao, Robert H. Deng
DIMVA
2009
13 years 6 months ago
Yataglass: Network-Level Code Emulation for Analyzing Memory-Scanning Attacks
Remote code-injection attacks are one of the most frequently used attacking vectors in computer security. To detect and analyze injected code (often called shellcode), some researc...
Makoto Shimamura, Kenji Kono