Sciweavers

DIMVA
2011
14 years 7 months ago
Reverse Social Engineering Attacks in Online Social Networks
Social networks are some of the largest and fastest growing online services today. Facebook, for example, has been ranked as the second most visited site on the Internet, and has b...
Danesh Irani, Marco Balduzzi, Davide Balzarotti, E...
DIMVA
2011
14 years 7 months ago
An Assessment of Overt Malicious Activity Manifest in Residential Networks
While conventional wisdom holds that residential users experience a high degree of compromise and infection, this presumption has seen little validation in the way of an in-depth s...
Gregor Maier, Anja Feldmann, Vern Paxson, Robin So...
DIMVA
2011
14 years 7 months ago
Timing Attacks on PIN Input in VoIP Networks (Short Paper)
To access automated voice services, Voice over IP (VoIP) users sometimes are required to provide their Personal Identification Numbers (PIN) for authentication. Therefore when the...
Ge Zhang, Simone Fischer-Hübner
DIMVA
2011
14 years 7 months ago
Code Pointer Masking: Hardening Applications against Code Injection Attacks
In this paper we present an efficient countermeasure against code injection attacks. Our countermeasure does not rely on secret values such as stack canaries and protects against a...
Pieter Philippaerts, Yves Younan, Stijn Muylle, Fr...
DIMVA
2011
14 years 7 months ago
Escape from Monkey Island: Evading High-Interaction Honeyclients
Abstract. High-interaction honeyclients are the tools of choice to detect malicious web pages that launch drive-by-download attacks. Unfortunately, the approach used by these tools...
Alexandros Kapravelos, Marco Cova, Christopher Kru...
DIMVA
2011
14 years 7 months ago
Operating System Interface Obfuscation and the Revealing of Hidden Operations
Many software security solutions—including malware analyzers, information flow tracking systems, auditing utilities, and host-based intrusion detectors—rely on knowledge of s...
Abhinav Srivastava, Andrea Lanzi, Jonathon T. Giff...
DIMVA
2011
14 years 7 months ago
What's Clicking What? Techniques and Innovations of Today's Clickbots
Abstract. With the widespread adoption of Internet advertising, fraud has become a systemic problem. While the existence of clickbots—malware specialized for conducting click-fra...
Brad Miller, Paul Pearce, Chris Grier, Christian K...
DIALM
2011
ACM
290views Algorithms» more  DIALM 2011»
14 years 7 months ago
MAC design for analog network coding
Majid Khabbazian, Fabian Kuhn, Nancy A. Lynch, Mur...
DIALM
2011
ACM
274views Algorithms» more  DIALM 2011»
14 years 7 months ago
Low complexity set reconciliation using Bloom filters
Magnus Skjegstad, Torleiv Maseng
DGCI
2011
Springer
14 years 7 months ago
Some Morphological Operators on Simplicial Complex Spaces
In this work, we propose a framework that allows to build morphological operators for processing and filtering objects defined on t) simplicial complex spaces. We illustrate with...
Fabio Dias, Jean Cousty, Laurent Najman