116
click to vote
NDSS
15 years 7 months ago
2009 IEEE
SybilInfer is an algorithm for labelling nodes in a social network as honest users or Sybils controlled by an adversary. At the heart of SybilInfer lies a probabilistic model of h...
NDSS
15 years 7 months ago
2009 IEEE
Kernel rootkits can provide user level-malware programs with the additional capabilities of hiding their malicious activities by altering the legitimate kernel behavior of an oper...
117
Voted
NDSS
15 years 7 months ago
2009 IEEE
Linking network flows is an important problem in intrusion detection as well as anonymity. Passive traffic analysis can link flows but requires long periods of observation to r...
112
Voted
NDSS
15 years 7 months ago
2009 IEEE
Anti-malware companies receive thousands of malware samples every day. To process this large quantity, a number of automated analysis tools were developed. These tools execute a m...
111
click to vote
NDSS
15 years 7 months ago
2009 IEEE
Many existing privacy-preserving techniques for querying distributed databases of sensitive information do not scale for large databases due to the use of heavyweight cryptographi...
|