Sciweavers

RAID
2010
Springer
13 years 3 months ago
A Data-Centric Approach to Insider Attack Detection in Database Systems
The insider threat against database management systems is a dangerous security problem. Authorized users may abuse legitimate privileges to masquerade as other users or to maliciou...
Sunu Mathew, Michalis Petropoulos, Hung Q. Ngo, Sh...
RAID
2010
Springer
13 years 3 months ago
An Analysis of Rogue AV Campaigns
Abstract. Rogue antivirus software has recently received extensive attention, justified by the diffusion and efficacy of its propagation. We present a longitudinal analysis of th...
Marco Cova, Corrado Leita, Olivier Thonnard, Angel...
RAID
2010
Springer
13 years 3 months ago
GrAVity: A Massively Parallel Antivirus Engine
Abstract. In the ongoing arms race against malware, antivirus software is at the forefront, as one of the most important defense tools in our arsenal. Antivirus software is flexib...
Giorgos Vasiliadis, Sotiris Ioannidis
RAID
2010
Springer
13 years 3 months ago
Community Epidemic Detection Using Time-Correlated Anomalies
Abstract. An epidemic is malicious code running on a subset of a community, a homogeneous set of instances of an application. Syzygy is an epidemic detection framework that looks f...
Adam J. Oliner, Ashutosh V. Kulkarni, Alex Aiken
RAID
2010
Springer
13 years 3 months ago
Behavior-Based Worm Detectors Compared
Abstract. Many worm detectors have been proposed and are being deployed, but the literature does not clearly indicate which one is the best. New worms such as IKEE.B (also known as...
Shad Stafford, Jun Li
RAID
2010
Springer
13 years 3 months ago
Live and Trustworthy Forensic Analysis of Commodity Production Systems
Lorenzo Martignoni, Aristide Fattori, Roberto Pale...