Sciweavers

148 search results - page 9 / 30
» Data Mining for Malicious Code Detection and Security Applic...
Sort
View
SAC
2006
ACM
15 years 3 months ago
Noxes: a client-side solution for mitigating cross-site scripting attacks
Web applications are becoming the dominant way to provide access to on-line services. At the same time, web application vulnerabilities are being discovered and disclosed at an al...
Engin Kirda, Christopher Krügel, Giovanni Vig...
ESSOS
2010
Springer
15 years 6 months ago
Idea: Opcode-Sequence-Based Malware Detection
Malware is every malicious code that has the potential to harm any computer or network. The amount of malware is increasing faster every year and poses a serious security threat. H...
Igor Santos, Felix Brezo, Javier Nieves, Yoseba K....
DAMON
2006
Springer
15 years 1 months ago
Using secure coprocessors for privacy preserving collaborative data mining and analysis
Secure coprocessors have traditionally been used as a keystone of a security subsystem, eliminating the need to protect the rest of the subsystem with physical security measures. ...
Bishwaranjan Bhattacharjee, Naoki Abe, Kenneth Gol...
ACSAC
2005
IEEE
15 years 3 months ago
Dynamic Taint Propagation for Java
Improperly validated user input is the underlying root cause for a wide variety of attacks on web-based applications. Static approaches for detecting this problem help at the time...
Vivek Haldar, Deepak Chandra, Michael Franz
SIGMOD
2001
ACM
165views Database» more  SIGMOD 2001»
15 years 9 months ago
Mining System Audit Data: Opportunities and Challenges
Intrusion detection is an essential component of computer security mechanisms. It requires accurate and efficient analysis of a large amount of system and network audit data. It c...
Wenke Lee, Wei Fan