Sciweavers

58 search results - page 10 / 12
» Detection of New Malicious Code Using N-grams Signatures
Sort
View
ISSRE
2008
IEEE
15 years 5 months ago
Detection and Prediction of Resource-Exhaustion Vulnerabilities
Systems connected to the Internet are highly susceptible to denial-of-service attacks that can compromise service availability, causing damage to customers and providers. Due to e...
João Antunes, Nuno Ferreira Neves, Paulo Ve...
CIS
2009
Springer
15 years 2 months ago
A Hierarchical Artificial Immune Model for Virus Detection
Abstract-- As viruses become more complex, existing antivirus methods are inefficient to detect various forms of viruses, especially new variants and unknown viruses. Inspired by i...
Wei Wang, Pengtao Zhang, Ying Tan, Xingui He
GLOBECOM
2010
IEEE
14 years 9 months ago
Cache-Based Scalable Deep Packet Inspection with Predictive Automaton
Abstract--Regular expression (Regex) becomes the standard signature language for security and application detection. Deterministic finite automata (DFAs) are widely used to perform...
Yi Tang, Junchen Jiang, Xiaofei Wang, Yi Wang, Bin...
DSN
2007
IEEE
15 years 2 months ago
Augmenting Branch Predictor to Secure Program Execution
Although there are various ways to exploit software vulnerabilities for malicious attacks, the attacks always result in unexpected behavior in program execution, deviating from wh...
Yixin Shi, Gyungho Lee
ACSAC
2006
IEEE
15 years 5 months ago
Back to the Future: A Framework for Automatic Malware Removal and System Repair
Malware is software with malicious intent. Besides viruses and worms, spyware, adware, and other newer forms of malware have recently emerged as widely-spread threats to system se...
Francis Hsu, Hao Chen, Thomas Ristenpart, Jason Li...