Sciweavers

28 search results - page 1 / 3
» Comprehensive shellcode detection using runtime heuristics
Sort
View
238 views 99 votes 14 years 11 months ago  ACSAC 2010»
A promising method for the detection of previously unknown code injection attacks is the identification of the shellcode that is part of the attack vector using payload execution....
214 views 108 votes 14 years 11 months ago  INFOCOM 2010»
Abstract—Malicious shellcodes are segments of binary code disguised as normal input data. Such shellcodes can be injected into a target process’s virtual memory. They overwrite...
153 views 100 votes 15 years 7 months ago  RAID 2007»
Network-level emulation has recently been proposed as a method for the accurate detection of previously unknown polymorphic code injection attacks. In this paper, we extend network...
128 views 112 votes 15 years 2 months ago  DIMVA 2006»
Abstract. As state-of-the-art attack detection technology becomes more prevalent, attackers are likely to evolve, employing techniques such as polymorphism and metamorphism to evad...
218 views 111 votes 15 years 2 months ago  CSREASAM 2003»
Automated rule induction procedures like machine learning and statistical techniques result in rules that lack generalization and maintainability. Developing rules manually throug...
159 views 106 votes 15 years 6 months ago  ICSM 2005»
In order to support the maintenance of object-oriented software systems, the quality of their design must be evaluated using adequate quantification means. In spite of the curren...
162 views 93 votes 15 years 6 months ago  ESA 2005»
In this paper, we will describe some heuristics that can be used to improve the runtime of a wide range of commonly used algorithms for the negative cycle detection problem signi...
248 views 146 votes 13 years 3 months ago  ISCA 2012»
Languages such as C and C++ use unsafe manual memory management, allowing simple bugs (i.e., accesses to an object after deallocation) to become the root cause of exploitable secu...
145 views 113 votes 15 years 6 months ago  INFOCOM 2003»
— Many topology discovery systems rely on traceroute to discover path information in public networks. However, for some routers, traceroute detects their existence but not their ...
223 views 109 votes 15 years 4 months ago  AINA 2007»
Pervasive computing environments introduce new requirements in expressiveness and flexibility of access control policies which are almost addressable leveraging contextual informa...