Filters








176 Hits in 9.3 sec

Adversarial EXEmples: A Survey and Experimental Evaluation of Practical Attacks on Machine Learning for Windows Malware Detection [article]

Luca Demetrio and Scott E. Coull and Battista Biggio and Giovanni Lagorio and Alessandro Armando and Fabio Roli
2021 arXiv   pre-print
attacks based on practical, functionality-preserving manipulations to the Windows Portable Executable (PE) file format.  ...  Our experimental results show that these attacks outperform existing ones in both white-box and black-box scenarios, achieving a better trade-off in terms of evasion rate and size of the injected payload  ...  The Windows PE file format.  ... 
arXiv:2008.07125v2 fatcat:kaolbh67qrdw3lqfyeyaqtyk5a

Emulation as a Digital Preservation Strategy

Stewart Granger
2000 D-Lib Magazine  
For a full list of titles please contact the Library Information Technology Centre. Distributed by Executive summary The brief for this project is outlined in Appendix 1.  ...  Planning for disaster recovery situations is commonplace in many organisations from businesses to higher education (e.g. much less attention has been paid to data recovery.  ...  Gerrard Sweeney (HATII Technician) advised on the experiments with emulation and contributed to the production of Section 2.3. This report was completed in December 1997.  ... 
doi:10.1045/october2000-granger fatcat:buuz3bzzqjfm5a32ukpmbuhhme

File Packing from the Malware Perspective: Techniques, Analysis Approaches, and Directions for Enhancements

Trivikram Muralidharan, Aviad Cohen, Noa Gerson, Nir Nissim
2022 ACM Computing Surveys  
This paper provides statistics on the use of packers based on an extensive analysis of 24,000 PE files (both malicious and benign files) for the past 10 years, which allowed us to observe trends in packing  ...  This paper then surveys 23 methods proposed in academic research for the detection and classification of packed portable executable (PE) files and highlights various trends in malware packing.  ...  for his devoted assistance in the packed files acquisition process.  ... 
doi:10.1145/3530810 fatcat:c6horhx3i5bevk5ibtu5y42rim

Automatic Mitigation of Kernel Rootkits in Cloud Environments [chapter]

Jonathan Grimm, Irfan Ahmed, Vassil Roussev, Manish Bhatt, ManPyo Hong
2018 Lecture Notes in Computer Science  
We evaluate a proof-of-concept prototype of the proposed system, called Nixer, against real-world malware samples in different scenarios.  ...  Critical evidence needed to understand and permanently remedy the original vulnerability may also be lost.  ...  We constructed a custom (malicious) program using our VMI capabilities to replace MS Windows function prelude with NOPs for the first function in a targeted PE file in memory.  ... 
doi:10.1007/978-3-319-93563-8_12 fatcat:52npuhgkczdo7cn653w6kg4xj4

Interacting with dead objects

Robin Salkeld, Gregor Kiczales
2013 SIGPLAN notices  
an unresolved memory leak in a mature mainstream application.  ...  We present an architecture that supports the restricted execution of ordinary code starting from the snapshot, as if the dead objects within it had been restored, but without access to their original external  ...  A portion of this work was funded by an NSERC PGS D award and the Institute for Computing, Information and Cognitive Systems (ICICS) at UBC.  ... 
doi:10.1145/2544173.2509543 fatcat:mz5wxyp5cza7pl2bq6rzrqqoeq

Interacting with dead objects

Robin Salkeld, Gregor Kiczales
2013 Proceedings of the 2013 ACM SIGPLAN international conference on Object oriented programming systems languages & applications - OOPSLA '13  
an unresolved memory leak in a mature mainstream application.  ...  We present an architecture that supports the restricted execution of ordinary code starting from the snapshot, as if the dead objects within it had been restored, but without access to their original external  ...  A portion of this work was funded by an NSERC PGS D award and the Institute for Computing, Information and Cognitive Systems (ICICS) at UBC.  ... 
doi:10.1145/2509136.2509543 dblp:conf/oopsla/SalkeldK13 fatcat:osbb7qyssbde7azbknuewuosdi

Java Management Extensions for application management

H. Kreger
2001 IBM Systems Journal  
For SNMP, the MIB (management infor- mation base) file represents this type of instrumen- tation. For CIM/WBEM, the instrumentation is defined as a schema in a MOF (managed object format) file.’  ...  MOF (managed object format) file. This format is used to describe CIM information and is defined by the DMTF in the CIM specification. See http://www.dmtf.org/spec cim_schema23/. .  ... 
doi:10.1147/sj.401.0104 fatcat:u3ppsdhhd5gqvconc6tpcs6tlm

Large Code Base Change Ripple Management in C++: My thoughts on how a new Boost C++ Library could help [article]

Niall Douglas
2014 arXiv   pre-print
The raft of new features in C++ 11/14 suggests that the complexity in the next generation of C++ code bases will overwhelm still further.  ...  The planned C++ 17 will probably worsen matters in ways difficult to presently imagine.  ...  UnQLite stores its data in a single file in a custom format.  ... 
arXiv:1405.3323v1 fatcat:htvlo6gvlnacjfjgd3svaqxvcy

RuC PROJECT FOR EDUCATION AND RELIABLE SOFTWARE SYSTEMS DEVELOPMENT
ПРОЕКТ РуСи ДЛЯ ОБУЧЕНИЯ И СОЗДАНИЯ ВЫСОКОНАДЕЖНЫХ ПРОГРАММНЫХ СИСТЕМ

Andrey Terekhov
2017 University News North-Caucasian Region Technical Sciences Series  
The core system described here, consisting of storage, file, display, text, and viewer managers, of program loader and device drivers, draws its major power from a suitably chosen, flexible set of basic  ...  facilities and, most importantly, of their effective extensibility in many directions and for many applications.  ...  The first was the move from a single "window", the screen, to multiple windows including windows showing different excerpts of the same graphic.  ... 
doi:10.17213/0321-2653-2017-3-70-75 fatcat:7hkqqpk3fresdexdq6bix7d6o4

YARIX: Scalable YARA-based Malware Intelligence

Michael Brengel, Christian Rossow
2021 USENIX Security Symposium  
While YARA is tremendously useful to inspect individual files, its run time grows linearly with the number of input files, resulting in prohibitive performance penalties in large malware corpora.  ...  In order to scale to large malware corpora, YARIX uses an inverted n-gram index that maps fixed-length byte sequences to lists of files in which they appear.  ...  Acknowledgments We would like to thank the anonymous USENIX reviewers of this paper as well as Giuliano Schneider, Benedikt Birtel and the anonymous AEC reviewers for testing YARIX.  ... 
dblp:conf/uss/BrengelR21 fatcat:f3mniu2ranbp7kelpiq2tqi3ki

CoinTossX: An open-source low-latency high-throughput matching engine [article]

Ivan Jericevich and Dharmesh Sing and Tim Gebbie
2021 arXiv   pre-print
The system separates the order-generation and simulation environments e.g. agent-based model simulation, from the matching of orders, data-feeds and various modularised components of the order-book system  ...  We promote the use of Julia as the preferred order submission and simulation environment.  ...  This data is only printed to file at the end of the simulation once all logged-in clients have logged out. The format of these files are shown in snippets 6 and 7 below.  ... 
arXiv:2102.10925v1 fatcat:ebeuaiicprd2dokl6ylc6inwzm

THE AMERICAN MUSEUM OF NATURAL HISTORY

1911 Science  
Save the batch file in plain text format as single1.bat. • Make sure to save single1.bat to the Tutorial folder. • In order for Windows to recognize a file as a batch file, the file must have the extension  ...  out file, pe is the SGE standard error file, o is the POY out file, and e is the POY standard error file.  ...  The input file looks like the input file for the molecular character type, except a pipe (|) separates the DNA strands of different loci.  ... 
doi:10.1126/science.33.839.142 pmid:17731786 fatcat:rktmdddq3jblpniceihkfymqji

THE AMERICAN MUSEUM OF NATURAL HISTORY

1903 Science  
Save the batch file in plain text format as single1.bat. • Make sure to save single1.bat to the Tutorial folder. • In order for Windows to recognize a file as a batch file, the file must have the extension  ...  out file, pe is the SGE standard error file, o is the POY out file, and e is the POY standard error file.  ...  The input file looks like the input file for the molecular character type, except a pipe (|) separates the DNA strands of different loci.  ... 
doi:10.1126/science.17.439.874 pmid:17740807 fatcat:gq6kbw4cxffsrhdkwlap27zqga

AMERICAN MUSEUM OF NATURAL HISTORY

1903 Science  
Save the batch file in plain text format as single1.bat. • Make sure to save single1.bat to the Tutorial folder. • In order for Windows to recognize a file as a batch file, the file must have the extension  ...  out file, pe is the SGE standard error file, o is the POY out file, and e is the POY standard error file.  ...  The input file looks like the input file for the molecular character type, except a pipe (|) separates the DNA strands of different loci.  ... 
doi:10.1126/science.17.427.394 pmid:17735121 fatcat:scixz3pfmrgi5j5lgbr5wnrtlq

THE AMERICAN MUSEUM OF NATURAL HISTORY

1927 Science  
Save the batch file in plain text format as single1.bat. • Make sure to save single1.bat to the Tutorial folder. • In order for Windows to recognize a file as a batch file, the file must have the extension  ...  out file, pe is the SGE standard error file, o is the POY out file, and e is the POY standard error file.  ...  The input file looks like the input file for the molecular character type, except a pipe (|) separates the DNA strands of different loci.  ... 
doi:10.1126/science.65.1672.31 fatcat:o6e4olz4qjbxjd5gc3daqoyzgm
« Previous Showing results 1 — 15 out of 176 results