Sciweavers

817 search results - page 44 / 164
» Malware behaviour analysis
Sort
View
INFOCOM
2007
IEEE
15 years 6 months ago
Analysis of the Reliability of a Nationwide Short Message Service
—SMS has been arguably the most popular wireless data service for cellular networks. Due to its ubiquitous availability and universal support by mobile handsets and cellular carr...
Xiaoqiao Meng, Petros Zerfos, Vidyut Samanta, Star...
IJDE
2006
95views more  IJDE 2006»
14 years 11 months ago
Exploiting the Rootkit Paradox with Windows Memory Analysis
Rootkits are malicious programs that silently subvert an operating system to hide an intruder's activities. Although there are a number of tools designed to detect rootkits, ...
Jesse D. Kornblum
CCS
2006
ACM
15 years 3 months ago
Using model-based security analysis in component-oriented system development
We propose an integrated process for component-based system development and security risk analysis. The integrated process is evaluated in a case study involving an instant messag...
Gyrd Brændeland, Ketil Stølen
DAGSTUHL
2006
15 years 1 months ago
Context Dependent Analysis of BioAmbients
BioAmbients is a derivative of mobile ambients that has shown promise of describing interesting features of the behaviour of biological systems. The technical contribution of this...
Henrik Pilegaard, Hanne Riis Nielson, Flemming Nie...
WCET
2008
15 years 1 months ago
Towards an Automatic Parametric WCET Analysis
Static WCET analysis obtains a safe estimation of the WCET of a program. The timing behaviour of a program depends in many cases on input, and an analysis could take advantage of ...
Stefan Bygde, Björn Lisper