Sciweavers

151 search results - page 24 / 31
» Semantics-Aware Malware Detection
Sort
View
AINA
2010
IEEE
15 years 2 months ago
CAPTCHA Using Strangeness in Machine Translation
— CAPTCHA is a technique that is used to prevent automatic programs from being able to acquire free e-mail or online service accounts. However, as many researchers have already r...
Takumi Yamamoto, J. Doug Tygar, Masakatsu Nishigak...
ICISC
2007
99views Cryptology» more  ICISC 2007»
14 years 11 months ago
Asynchronous Pseudo Physical Memory Snapshot and Forensics on Paravirtualized VMM Using Split Kernel Module
VMM (virtual machine monitor) based system provides the useful inspection and interposition of guest OS. With proper modification of guest OS, we can obtain event-driven memory sn...
Ruo Ando, Youki Kadobayashi, Yoichi Shinoda
EUROSYS
2009
ACM
15 years 6 months ago
Pointless tainting?: evaluating the practicality of pointer tainting
This paper evaluates pointer tainting, an incarnation of Dynamic Information Flow Tracking (DIFT), which has recently become an important technique in system security. Pointer tai...
Asia Slowinska, Herbert Bos
DIMVA
2009
14 years 10 months ago
Browser Fingerprinting from Coarse Traffic Summaries: Techniques and Implications
We demonstrate that the browser implementation used at a host can be passively identified with significant precision and recall, using only coarse summaries of web traffic to and f...
Ting-Fang Yen, Xin Huang, Fabian Monrose, Michael ...
NOMS
2010
IEEE
134views Communications» more  NOMS 2010»
14 years 8 months ago
Packet sampling for worm and botnet detection in TCP connections
—Malware and botnets pose a steady and growing threat to network security. Therefore, packet analysis systems examine network traffic to detect active botnets and spreading worm...
Lothar Braun, Gerhard Münz, Georg Carle