Sciweavers

3 search results - page 1 / 1
» Amun: Automatic Capturing of Malicious Software
Sort
View
67
Voted
SICHERHEIT
2010
14 years 7 months ago
Amun: Automatic Capturing of Malicious Software
: This paper describes the low-interaction server honeypot Amun. Through the use of emulated vulnerabilities Amun aims at capturing malware in an automated fashion. The use of the ...
Jan Göbel
80
Voted
COMPSAC
2008
IEEE
14 years 11 months ago
Avoiding Program Failures Through Safe Execution Perturbations
We present an online framework to capture and recover from program failures and prevent them from occurring in the future through safe execution perturbations. The perturbations a...
Sriraman Tallam, Chen Tian, Rajiv Gupta, Xiangyu Z...
RAID
2010
Springer
14 years 8 months ago
Detecting the Onset of Infection for Secure Hosts
Abstract. Software flaws in applications such as a browser may be exploited by attackers to launch drive-by-download (DBD), which has become the major vector of malware infection....
Kui Xu, Qiang Ma, Danfeng (Daphne) Yao