Sciweavers

226 search results - page 12 / 46
» An Investigation of Analysis Techniques for Software Dataset...
Sort
View
KDD
2009
ACM
173views Data Mining» more  KDD 2009»
15 years 4 months ago
Malware detection using statistical analysis of byte-level file content
Commercial anti-virus software are unable to provide protection against newly launched (a.k.a “zero-day”) malware. In this paper, we propose a novel malware detection techniqu...
S. Momina Tabish, M. Zubair Shafiq, Muddassar Faro...
CHES
2009
Springer
265views Cryptology» more  CHES 2009»
16 years 7 days ago
Higher-Order Masking and Shuffling for Software Implementations of Block Ciphers
Differential Power Analysis (DPA) is a powerful side channel key recovery attack that efficiently breaks block ciphers implementations. In software, two main techniques are usually...
Matthieu Rivain, Emmanuel Prouff, Julien Doget
PST
2004
15 years 1 months ago
Detection of New Malicious Code Using N-grams Signatures
Signature-based malicious code detection is the standard technique in all commercial anti-virus software. This method can detect a virus only after the virus has appeared and cause...
Tony Abou-Assaleh, Nick Cercone, Vlado Keselj, Ray...
IJDE
2007
384views more  IJDE 2007»
14 years 11 months ago
Computer Forensic Analysis in a Virtual Environment
In this paper we discuss the potential role of virtual environments in the analysis phase of computer forensics investigations. General concepts of virtual environments and softwa...
Derek Bem, Ewa Huebner
RE
2008
Springer
14 years 11 months ago
"Fairness Analysis" in Requirements Assignments
Requirements engineering for multiple customers, each of whom have competing and often conflicting priorities, raises issues of negotiation, mediation and conflict resolution. Thi...
Anthony Finkelstein, Mark Harman, S. Afshin Mansou...