Springer Science and Business Media LLC

Công bố khoa học tiêu biểu

* Dữ liệu chỉ mang tính chất tham khảo

Sắp xếp:  
Malicious origami in PDF
Springer Science and Business Media LLC - Tập 6 - Trang 289-315 - 2009
Frédéric Raynal, Guillaume Delugré, Damien Aumaitre
People have now come to understand the risks associated with MS Office documents: whether those risks are caused by macros or associated breaches. PDF documents on the contrary seem to be much more secure and reliable. This false sense of security mainly comes from the fact that these documents appear to be static. The widespread use of Acrobat Reader is most likely also accountable for this pheno...... hiện toàn bộ
Enabling automated threat response through the use of a dynamic security policy
Springer Science and Business Media LLC - Tập 3 - Trang 195-210 - 2007
Hervé Debar, Yohann Thomas, Frédéric Cuppens, Nora Cuppens-Boulahia
Information systems security issues are currently being addressed using different techniques, such as authentication, encryption and access control, through the definition of security policies, but also using monitoring techniques, in particular intrusion detection systems. We can observe that security monitoring is currently totally decorrelated from security policies, that is security requiremen...... hiện toàn bộ
On callgraphs and generative mechanisms
Springer Science and Business Media LLC - Tập 3 - Trang 299-310 - 2007
Daniel Bilar
This paper examines the structural features of callgraphs. The sample consisted of 120 malicious and 280 non-malicious executables. Pareto models were fitted to indegree, outdegree and basic block count distribution, and a statistically significant difference shown for the derived power law exponent. A two-step optimization process involving human designers and code compilers is proposed to accoun...... hiện toàn bộ
Discovering and exploiting 802.11 wireless driver vulnerabilities
Springer Science and Business Media LLC - Tập 4 - Trang 25-37 - 2007
Laurent Butti, Julien Tinnés
802.11 Wireless local area networks are unfortunately notoriously infamous due to their many, critical security flaws. Last year, world-first 802.11 wireless driver vulnerabilities were publicly disclosed, making them a critical and recent threat. In this paper, we expose our research results on 802.11 driver vulnerabilities by focusing on the design and implementation of a fully featured 802.11 f...... hiện toàn bộ
Bologna process revisited: educating information security and malware experts
Springer Science and Business Media LLC - Tập 3 - Trang 149-161 - 2007
Urs E. Gattiker
The Bologna process has resulted in the re- structuring of undergraduate and graduate education across Europe. This paper outlines what these changes mean for acquiring degrees in information security and how various universities have tried to respond to these demands. What is unclear at this stage is how the offering of continuous master degrees at Polytechnic and Applied Science Universities wil...... hiện toàn bộ
Considering the potential of criminal profiling to combat hacking
Springer Science and Business Media LLC - - 2007
Jörg Preuß, Steven Furnell, Maria Papadaki
Code mutation techniques by means of formal grammars and automatons
Springer Science and Business Media LLC - Tập 5 - Trang 199-207 - 2009
Pavel V. Zbitskiy
The paper describes formalization of existing code mutation techniques widely used in a viruses (polymorphism and metamorphism) by means of formal grammars and automatons. New model of metamorphic viruses and new classification of this type of viruses are suggested. The statement about undetectable viruses of this type is proved. In that paper are shown iterative approach toward construct complex ...... hiện toàn bộ
Filter-resistant code injection on ARM
Springer Science and Business Media LLC - Tập 7 - Trang 173-188 - 2010
Yves Younan, Pieter Philippaerts, Frank Piessens, Wouter Joosen, Sven Lachmund, Thomas Walter
Code injection attacks are one of the most powerful and important classes of attacks on software. In these attacks, the attacker sends malicious input to a software application, where it is stored in memory. The malicious input is chosen in such a way that its representation in memory is also a valid representation of a machine code program that performs actions chosen by the attacker. The attacke...... hiện toàn bộ
Enforcing kernel constraints by hardware-assisted virtualization
Springer Science and Business Media LLC - Tập 7 - Trang 1-21 - 2009
Éric Lacombe, Vincent Nicomette, Yves Deswarte
This article deals with kernel security protection. We propose a characterization of malicious kernel-targeted actions, based on how the way they act to corrupt the kernel. Then, we discuss security measures able to counter such attacks. We finally expose our approach based on hardware-virtualization that is partially implemented into our demonstrator Hytux, which is inspired from bluepill (Rutkow...... hiện toàn bộ
Letter from the EICAR Chairman
Springer Science and Business Media LLC - Tập 3 - Trang 61-61 - 2007
Rainer Fahs, Vlasti Broucek
Tổng số: 105   
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 10