Malicious origami in PDFSpringer Science and Business Media LLC - Tập 6 - Trang 289-315 - 2009
Frédéric Raynal, Guillaume Delugré, Damien Aumaitre
People have now come to understand the risks associated with MS Office
documents: whether those risks are caused by macros or associated breaches. PDF
documents on the contrary seem to be much more secure and reliable. This false
sense of security mainly comes from the fact that these documents appear to be
static. The widespread use of Acrobat Reader is most likely also accountable for
this pheno... hiện toàn bộ
Enabling automated threat response through the use of a dynamic security policySpringer Science and Business Media LLC - Tập 3 - Trang 195-210 - 2007
Hervé Debar, Yohann Thomas, Frédéric Cuppens, Nora Cuppens-Boulahia
Information systems security issues are currently being addressed using
different techniques, such as authentication, encryption and access control,
through the definition of security policies, but also using monitoring
techniques, in particular intrusion detection systems. We can observe that
security monitoring is currently totally decorrelated from security policies,
that is security requiremen... hiện toàn bộ
On callgraphs and generative mechanismsSpringer Science and Business Media LLC - Tập 3 - Trang 299-310 - 2007
Daniel Bilar
This paper examines the structural features of callgraphs. The sample consisted
of 120 malicious and 280 non-malicious executables. Pareto models were fitted to
indegree, outdegree and basic block count distribution, and a statistically
significant difference shown for the derived power law exponent. A two-step
optimization process involving human designers and code compilers is proposed to
accoun... hiện toàn bộ
Discovering and exploiting 802.11 wireless driver vulnerabilitiesSpringer Science and Business Media LLC - Tập 4 - Trang 25-37 - 2007
Laurent Butti, Julien Tinnés
802.11 Wireless local area networks are unfortunately notoriously infamous due
to their many, critical security flaws. Last year, world-first 802.11 wireless
driver vulnerabilities were publicly disclosed, making them a critical and
recent threat. In this paper, we expose our research results on 802.11 driver
vulnerabilities by focusing on the design and implementation of a fully featured
802.11 f... hiện toàn bộ
Bologna process revisited: educating information security and malware expertsSpringer Science and Business Media LLC - Tập 3 - Trang 149-161 - 2007
Urs E. Gattiker
The Bologna process has resulted in the re- structuring of undergraduate and
graduate education across Europe. This paper outlines what these changes mean
for acquiring degrees in information security and how various universities have
tried to respond to these demands. What is unclear at this stage is how the
offering of continuous master degrees at Polytechnic and Applied Science
Universities wil... hiện toàn bộ
Code mutation techniques by means of formal grammars and automatonsSpringer Science and Business Media LLC - Tập 5 - Trang 199-207 - 2009
Pavel V. Zbitskiy
The paper describes formalization of existing code mutation techniques widely
used in a viruses (polymorphism and metamorphism) by means of formal grammars
and automatons. New model of metamorphic viruses and new classification of this
type of viruses are suggested. The statement about undetectable viruses of this
type is proved. In that paper are shown iterative approach toward construct
complex ... hiện toàn bộ
Filter-resistant code injection on ARMSpringer Science and Business Media LLC - Tập 7 - Trang 173-188 - 2010
Yves Younan, Pieter Philippaerts, Frank Piessens, Wouter Joosen, Sven Lachmund, Thomas Walter
Code injection attacks are one of the most powerful and important classes of
attacks on software. In these attacks, the attacker sends malicious input to a
software application, where it is stored in memory. The malicious input is
chosen in such a way that its representation in memory is also a valid
representation of a machine code program that performs actions chosen by the
attacker. The attacke... hiện toàn bộ
Enforcing kernel constraints by hardware-assisted virtualizationSpringer Science and Business Media LLC - Tập 7 - Trang 1-21 - 2009
Éric Lacombe, Vincent Nicomette, Yves Deswarte
This article deals with kernel security protection. We propose a
characterization of malicious kernel-targeted actions, based on how the way they
act to corrupt the kernel. Then, we discuss security measures able to counter
such attacks. We finally expose our approach based on hardware-virtualization
that is partially implemented into our demonstrator Hytux, which is inspired
from bluepill (Rutkow... hiện toàn bộ