E-Books durchsuchen

Detection of Intrusions and Malware, and Vulnerability Assessment [2014]

1
Data Structure Archaeology: Scrape Away the Dirt and Glue Back the Pieces!
21
Identifying Shared Software Components to Support Malware Forensics
41
Instruction-Level Steganography for Covert Trigger-Based Malware
51
AndRadar: Fast Discovery of Android Applications in Alternative Markets
72
Attacks on Android Clipboard
92
I Sensed It Was You: Authenticating Mobile Users with Sensor-Enhanced Keystroke Dynamics
112
AV-Meter: An Evaluation of Antivirus Scans and Labels
132
PExy: The Other Side of Exploit Kits
152
Metadata-Driven Threat Classification of Network Endpoints Appearing in Malware
172
Parallelization of Network Intrusion Detection Systems under Attack Conditions
192
Phoenix: DGA-Based Botnet Tracking and Intelligence
212
Quantifiable Run-Time Kernel Attack Surface Reduction
235
Bee Master: Detecting Host-Based Code Injection Attacks
255
Diagnosis and Emergency Patch Generation for Integer Overflow Exploits
Feedback