Springer Science and Business Media LLC

Công bố khoa học tiêu biểu

* Dữ liệu chỉ mang tính chất tham khảo

Sắp xếp:  
Malware phylogeny generation using permutations of code
Springer Science and Business Media LLC - Tập 1 - Trang 13-23 - 2005
Md. Enamul. Karim, Andrew Walenstein, Arun Lakhotia, Laxmi Parida
Malicious programs, such as viruses and worms, are frequently related to previous programs through evolutionary relationships. Discovering those relationships and constructing a phylogeny model is expected to be helpful for analyzing new malware and for establishing a principled naming scheme. Matching permutations of code may help build better models in cases where malware evolution does not keep...... hiện toàn bộ
Enabling automated threat response through the use of a dynamic security policy
Springer Science and Business Media LLC - Tập 3 - Trang 195-210 - 2007
Hervé Debar, Yohann Thomas, Frédéric Cuppens, Nora Cuppens-Boulahia
Information systems security issues are currently being addressed using different techniques, such as authentication, encryption and access control, through the definition of security policies, but also using monitoring techniques, in particular intrusion detection systems. We can observe that security monitoring is currently totally decorrelated from security policies, that is security requiremen...... hiện toàn bộ
Semi-automatic binary protection tampering
Springer Science and Business Media LLC - - 2009
Yoann Guillot, Alexandre Gazet
Both on malicious binaries and commercial software like video games, the complexity of software protections, which aim at slowing reverse-engineering, is constantly growing. Analyzing those protections and eventually circumventing them, require more and more elaborated tools. Through two examples, we illustrate some particularly interesting protection families and try to show their limits and how ...... hiện toàn bộ
Dronezilla: designing an accurate malware behavior retrieval system
Springer Science and Business Media LLC - Tập 8 - Trang 109-116 - 2012
Mihai Cimpoesu, Claudiu Popa
In a world where computer infections crawl from every corner of the web, reliable technological assets must be developed for fighting against the swarm of ever-increasing number of malicious software. With reliability and automation as our primary goals, we developed a framework environment based on real hardware. Within this environment one can automate most of the quality assurance and malware a...... hiện toàn bộ
Foreword
Springer Science and Business Media LLC - Tập 2 - Trang 1-2 - 2006
Vlasti Broucek, Eric Filiol, Paul Turner
Automatic binary deobfuscation
Springer Science and Business Media LLC - Tập 6 - Trang 261-276 - 2009
Yoann Guillot, Alexandre Gazet
This paper gives an overview of our research in the automation of the process of software protection analysis. We will focus more particularly on the problem of obfuscation. Our current approach is based on a local semantic analysis, which aims to rewrite the binary code in a simpler (easier to understand) way. This approach has the advantage of not relying on a manual search for “patterns” of obf...... hiện toàn bộ
Detecting masquerades using a combination of Naïve Bayes and weighted RBF approach
Springer Science and Business Media LLC - Tập 3 - Trang 237-245 - 2007
Alok Sharma, Kuldip K. Paliwal
Masquerade detection by automated means is gaining widespread interest due to the serious impact of masquerades on computer system or network. Several techniques have been introduced in an effort to minimize up to some extent the risk associated with masquerade attack. In this respect, we have developed a novel technique which comprises of Naïve Bayes approach and weighted radial basis function si...... hiện toàn bộ
Windows memory forensics
Springer Science and Business Media LLC - - 2008
Nicolas Ruff
Malicious origami in PDF
Springer Science and Business Media LLC - Tập 6 - Trang 289-315 - 2009
Frédéric Raynal, Guillaume Delugré, Damien Aumaitre
People have now come to understand the risks associated with MS Office documents: whether those risks are caused by macros or associated breaches. PDF documents on the contrary seem to be much more secure and reliable. This false sense of security mainly comes from the fact that these documents appear to be static. The widespread use of Acrobat Reader is most likely also accountable for this pheno...... hiện toàn bộ
Foreword
Springer Science and Business Media LLC - Tập 3 - Trang 1-2 - 2007
Guillaume Bonfante, Jean-Yves Marion
Tổng số: 105   
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 10