131
click to vote
ACSAC
15 years 6 months ago
2006 IEEE
Active worms pose major security threats to the Internet. In this paper, we investigate a new class of active worms, i.e., Camouflaging Worm (C-Worm in short). The C-Worm has the ...
124
Voted
ACSAC
15 years 8 months ago
2006 IEEE
Modern malware often hide the malicious portion of their program code by making it appear as data at compiletime and transforming it back into executable code at runtime. This obf...
ACSAC
15 years 6 months ago
2006 IEEE
Signature-matching Intrusion Detection Systems can experience significant decreases in performance when the load on the IDS-host increases. We propose a solution that off-loads so...
111
Voted
ACSAC
15 years 6 months ago
2006 IEEE
Several secure computing hardware architectures using memory encryption and memory integrity checkers have been proposed during the past few years to provide applications with a t...
113
click to vote
ACSAC
15 years 8 months ago
2006 IEEE
This work introduces the A system1 , an Internetbased, free and open source electronic voting system which employs strong cryptography. Our system is a fully functiona...
|