Sciweavers

Share
9 search results - page 1 / 2
» sicherheit 2010
Sort
View
SICHERHEIT
2010
10 years 11 months ago
Session Fixation - The Forgotten Vulnerability?
Michael Schrank, Bastian Braun, Martin Johns, Joac...
SICHERHEIT
2010
10 years 11 months ago
Bedrohungsmodellierung (Threat Modeling) in der Softwareentwicklung
: Threat Modeling erm
Fabian Schwab, Alexander Findeisen, Peter Sakal, H...
SICHERHEIT
2010
10 years 11 months ago
Amun: Automatic Capturing of Malicious Software
: This paper describes the low-interaction server honeypot Amun. Through the use of emulated vulnerabilities Amun aims at capturing malware in an automated fashion. The use of the ...
Jan Göbel
SICHERHEIT
2010
10 years 11 months ago
A Malware Instruction Set for Behavior-Based Analysis
We introduce a new representation for monitored behavior of malicious software called Malware Instruction Set (MIST). The representation is optimized for effective and efficient a...
Philipp Trinius, Carsten Willems, Thorsten Holz, K...
SICHERHEIT
2010
10 years 11 months ago
CAPTCHAs: The Good, the Bad, and the Ugly
A CAPTCHA is a program that generates challenges that are easy to solve for humans but difficult to solve for computers. The most common CAPTCHAs today are text-based ones where a ...
Paul Baecher, Marc Fischlin, Lior Gordon, Robert L...
books