Sciweavers

DSN
2008
IEEE
15 years 7 months ago
Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware
Many threats that plague today’s networks (e.g., phishing, botnets, denial of service attacks) are enabled by a complex ecosystem of attack programs commonly called malware. To ...
Xu Chen, Jonathon Andersen, Zhuoqing Morley Mao, M...
98
Voted
DSN
2008
IEEE
15 years 7 months ago
AGIS: Towards automatic generation of infection signatures
An important yet largely uncharted problem in malware defense is how to automate generation of infection signatures for detecting compromised systems, i.e., signatures that charac...
Zhuowei Li, XiaoFeng Wang, Zhenkai Liang, Michael ...
DSN
2008
IEEE
15 years 7 months ago
Automated duplicate detection for bug tracking systems
Bug tracking systems are important tools that guide the maintenance activities of software developers. The utility of these systems is hampered by an excessive number of duplicate...
Nicholas Jalbert, Westley Weimer
DSN
2008
IEEE
15 years 7 months ago
Anomaly? application change? or workload change? towards automated detection of application performance anomaly and change
: Automated tools for understanding application behavior and its changes during the application life-cycle are essential for many performance analysis and debugging tasks. Applicat...
Ludmila Cherkasova, Kivanc M. Ozonat, Ningfang Mi,...
DSN
2008
IEEE
15 years 2 months ago
An accurate flip-flop selection technique for reducing logic SER
The combination of continued technology scaling and increased on-chip transistor densities has made vulnerability to radiation induced soft errors a significant design concern. In...
Eric L. Hill, Mikko H. Lipasti, Kewal K. Saluja
Computer Networks
Top of PageReset Settings