Filters








7,054 Hits in 5.2 sec

Artificial Malware Immunization Based on Dynamically Assigned Sense of Self [chapter]

Xinyuan Wang, Xuxian Jiang
2011 Lecture Notes in Computer Science  
Most malwares conduct their malicious actions via hijacking the control flow of the infected system or program.  ...  immunized real-world, unpatched, vulnerable applications (e.g., Snort 2.6.1 with over 140,000 lines C code) against otherwise working exploits.  ...  We achieve this goal of transparent malware immunization via static program instrumentation.  ... 
doi:10.1007/978-3-642-18178-8_15 fatcat:2b7gi52osfbnzjkarkpdlnml4e

Optical detection of random features for high security applications

T Haist, H.J Tiziani
1998 Optics Communications  
The method is applied for protecting banknotes. Experimental results for this application are presented. The method is also applicable for identity verification of a credit-or chip-card holder.  ...  Optical detection of random features in combination with digital signatures based on public key codes in order to recognise counterfeit objects will be discussed.  ...  As an example, we used this method in order to protect German banknotes against counterfeiting. Practical results obtained for this application are presented. II.  ... 
doi:10.1016/s0030-4018(97)00546-4 fatcat:xu4ygrymfvazdjdwdyzwzhral4

Hiding Your Wares: Transparently Retrofitting Memory Confidentiality into Legacy Applications

J. Levy, B. Khan
2007 2007 IEEE International Conference on Communications  
The Memory Encryption and Transparent Aegis Library (METAL) functions as a shim library, allowing legacy applications to transparently enjoy an assurance of memory confidentiality and integrity.  ...  The proposed solution is tunable in terms of trade-offs between security and computational overhead. We describe the design of the library and evaluate its benefits and performance trade-offs.  ...  ACKNOWLEDGMENTS The authors would like to thank the Center for Cybercrime Studies at John Jay and the John Jay College Office of Sponsored Research for supporting this research effort.  ... 
doi:10.1109/icc.2007.230 dblp:conf/icc/LevyK07 fatcat:3snzlby3afczthkimvqvmbtlaq

Object Flow Integrity

Wenhao Wang, Xiaoyang Xu, Kevin W. Hamlen
2017 Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security - CCS '17  
for some common-case applications.  ...  Object flow integrity (OFI) augments control-flow integrity (CFI) and software fault isolation (SFI) protections with secure, first-class support for binary object exchange across inter-module trust boundaries  ...  Any opinions, recommendations, or conclusions expressed are those of the authors and not necessarily of the aforementioned organizations.  ... 
doi:10.1145/3133956.3133986 dblp:conf/ccs/WangXH17 fatcat:oefwmh46dbhctaubc54cvfgprq

Behavioral Modeling for Suspicious Process Detection in Cloud Computing Environments

Andrey Dolgikh, Zachary Birnbaum, Yu Chen, Victor Skormin
2013 2013 IEEE 14th International Conference on Mobile Data Management  
One of the defining features of cloud computing, multi-tenancy provides significant benefits to both clients and service providers by supporting elastic on-demand resource provisioning and efficient resource  ...  Timely detection/mitigation of intrusive behaviors of malicious processes using signature based intrusion detection technologies or system call level anomaly analysis due to high false alarm rate presents  ...  cloud in a transparent manner.  ... 
doi:10.1109/mdm.2013.90 dblp:conf/mdm/DolgikhBCS13 fatcat:uvclz2d2l5dopnmgmzezjblbri

Ninja: Towards Transparent Tracing and Debugging on ARM

Zhenyu Ning, Fengwei Zhang
2017 USENIX Security Symposium  
NINJA leverages a hardware-assisted isolated execution environment Trust-Zone to transparently trace and debug a target application with the help of Performance Monitor Unit and Embedded Trace Macrocell  ...  We implement a prototype of NINJA (i.e., tracing and debugging subsystems), and the experiment results show that NINJA is efficient and transparent for malware analysis.  ...  Patagonix [33] leverages a database of whitelisted applications binary pages to learn the semantic information in the memory pages of the target application.  ... 
dblp:conf/uss/NingZ17 fatcat:mw3bu2pncrgixmu7zm3isdu4my

"Double-DIP": Unsupervised Image Decomposition via Coupled Deep-Image-Priors [article]

Yossi Gandelsman, Assaf Shocher, Michal Irani
2018 arXiv   pre-print
We show that coupling multiple such DIPs provides a powerful tool for decomposing images into their basic components, for a wide variety of applications.  ...  We show the power of this approach for Image-Dehazing, Fg/Bg Segmentation, Watermark-Removal, Transparency Separation in images and video, and more.  ...  We demonstrate the applicability of this approach to a wide range of computer vision tasks, including Image-Dehazing, Fg/Bg Segmentation of images and videos, Watermark Removal, and Transparency Separation  ... 
arXiv:1812.00467v2 fatcat:lxa3fikij5gwvb5yqvixadgfgy

BLADE

Long Lu, Vinod Yegneswaran, Phillip Porras, Wenke Lee
2010 Proceedings of the 17th ACM conference on Computer and communications security - CCS '10  
Providing such protection without requiring prior knowledge of the exploit method guarantees BLADE's immunity to circumvention techniques and zero-day threats that directly contribute to today's pervasiveness  ...  of drive-by malware.  ...  to transparency.  ... 
doi:10.1145/1866307.1866356 dblp:conf/ccs/LuYPL10 fatcat:ba2d5ik2onax7dzinobopdvwfu

Subverting system authentication with context-aware, reactive virtual machine introspection

Yangchun Fu, Zhiqiang Lin, Kevin W. Hamlen
2013 Proceedings of the 29th Annual Computer Security Applications Conference on - ACSAC '13  
It can then leverage the VMI to transparently corrupt the control-flow or data-flow of the victim OS at that point, resulting in successful authentication without any password-guessing or encryption-cracking  ...  The approach is highly flexible (threatening a broad class of authentication implementations), practical (realizable against real-world OSes and VM images), and useful for both malicious attacks and forensics  ...  Any opinions, findings, conclusions, or recommendations expressed are those of the authors and not necessarily of VMware or the NSF.  ... 
doi:10.1145/2523649.2523664 dblp:conf/acsac/FuLH13 fatcat:2bxunhnlxrgzvafkxxb62wiori

W3Bcrypt: Encryption as a Stylesheet [chapter]

Angelos Stavrou, Michael E. Locasto, Angelos D. Keromytis
2006 Lecture Notes in Computer Science  
We introduce W3Bcrypt, an extension to the Mozilla Firefox platform that enables application-level cryptographic protection for web content.  ...  The end-to-end (E2E) encryption of data becomes increasingly important in these trust models to protect the confidentiality and integrity of the data against snooping and modification.  ...  Most importantly, neither can protect from a compromised or malicious application server because their confidentiality and integrity 1 protections do not reach up through the application layer.  ... 
doi:10.1007/11767480_24 fatcat:52t3ziaw2bbnth32w7v4pawt6q

A Tamper Proofing Text Watermarking Shift Algorithm for Copyright Protection

Amira Afify, Ahmed Emran, Ahmed yahya
2019 Arab Journal of Nuclear Sciences and Applications  
In this paper a blind text watermarking approach is proposed for copyright protection and tamper detection of plain text by inter-word spacing (depending on a secret binary number and a key word) and text  ...  Watermarking has proved its great reliability and flexibility for property rights protection and tamper detection of diverse forms of online distributed data.  ...  Cryptography is one of the most effectual sciences that offer solution to immunize transmitted data.  ... 
doi:10.21608/ajnsa.2019.6694.1156 fatcat:s7go27cfdfejhezeesa2wbknne

Software Distribution Transparency and Auditability [article]

Benjamin Hof, Georg Carle
2017 arXiv   pre-print
In addition, in our system, the availability of source code is ensured, the binding between source and binary code is verified using reproducible builds, and the maintainer responsible for distributing  ...  We propose a transparency system for software updates and implement it for a widely deployed Linux package manager, namely APT.  ...  Fahl et al. suggest a transparency model for Android applications, providing "Application Transparency" [13] .  ... 
arXiv:1711.07278v1 fatcat:yv3wczkwvvehxeabifo6fiode4

"Double-DIP": Unsupervised Image Decomposition via Coupled Deep-Image-Priors

Yosef Gandelsman, Assaf Shocher, Michal Irani
2019 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)  
An image can be viewed as a mixture of "simpler" layers.  ...  ., segmentation, dehazing, transparency separation). Such a decomposition can be achieved using "Double-DIP".  ...  We demonstrate the applicability of this approach to a wide range of computer vision tasks, including Image-Dehazing, Fg/Bg Segmentation of images and videos, Watermark Removal, and Transparency Separation  ... 
doi:10.1109/cvpr.2019.01128 dblp:conf/cvpr/GandelsmanSI19 fatcat:labs7ysstngtnisqqsttlonk6m

Fairness in Machine Learning: A Survey [article]

Simon Caton, Christian Haas
2020 arXiv   pre-print
Although much of the literature emphasizes binary classification, a discussion of fairness in regression, recommender systems, unsupervised learning, and natural language processing is also provided along  ...  As Machine Learning technologies become increasingly used in contexts that affect citizens, companies as well as researchers need to be confident that their application of these methods will not have unexpected  ...  [67, 4, 291] ) via subgroup analysis.  ... 
arXiv:2010.04053v1 fatcat:cvao3z5fmzc3xoehq5q7tqfvgy

Contents: (Adv. Funct. Mater. 29/2021)

2021 Advanced Functional Materials  
With its increased ISI Impact Factor of 27.398, Advanced Materials is one of the most influential journals in the field.  ...  Publishing every week, Advanced Materials now brings you even more of the latest results at the cutting edge of materials science.  ...  effect and creation of immune memory.  ... 
doi:10.1002/adfm.202170209 fatcat:soh2kwnoozhrfjrsh2x4c4bmdq
« Previous Showing results 1 — 15 out of 7,054 results