Sciweavers

9 search results - page 1 / 2
» sicherheit 2010
Sort
View
77
Voted
SICHERHEIT
2010
14 years 10 months ago
Session Fixation - The Forgotten Vulnerability?
Michael Schrank, Bastian Braun, Martin Johns, Joac...
106
Voted
SICHERHEIT
2010
14 years 10 months ago
Bedrohungsmodellierung (Threat Modeling) in der Softwareentwicklung
: Threat Modeling erm
Fabian Schwab, Alexander Findeisen, Peter Sakal, H...
88
Voted
SICHERHEIT
2010
14 years 10 months ago
Amun: Automatic Capturing of Malicious Software
: This paper describes the low-interaction server honeypot Amun. Through the use of emulated vulnerabilities Amun aims at capturing malware in an automated fashion. The use of the ...
Jan Göbel
89
Voted
SICHERHEIT
2010
14 years 10 months ago
A Malware Instruction Set for Behavior-Based Analysis
We introduce a new representation for monitored behavior of malicious software called Malware Instruction Set (MIST). The representation is optimized for effective and efficient a...
Philipp Trinius, Carsten Willems, Thorsten Holz, K...
SICHERHEIT
2010
14 years 10 months ago
CAPTCHAs: The Good, the Bad, and the Ugly
A CAPTCHA is a program that generates challenges that are easy to solve for humans but difficult to solve for computers. The most common CAPTCHAs today are text-based ones where a ...
Paul Baecher, Marc Fischlin, Lior Gordon, Robert L...