Filters








37 Hits in 5.6 sec

SYSTEM CALL DEPENDENCE GRAPH BASED BEHAVIOR DECOMPOSITION OF ANDROID APPLICATIONS

Bin Zhao
2019 Zenodo  
The study also shows that our approach can effectively identify potential permission abusing, with an almost negligible performance impact.  ...  Millions of developers and third-party organizations have flooded into the Android ecosystem due to Android's open-source feature and low barriers to entry for developers. .However, that also attracts  ...  Spyware can stealthily collect data regarding user's behaviors and send those data to a remote server.  ... 
doi:10.5281/zenodo.3365780 fatcat:f3n33dfnjfey5ep3daqbrjl2ru

Inspector Gadget: Automated Extraction of Proprietary Gadgets from Malware Binaries

Clemens Kolbitsch, Thorsten Holz, Christopher Kruegel, Engin Kirda
2010 2010 IEEE Symposium on Security and Privacy  
Our evaluation with several real-world samples demonstrates that our approach is versatile and useful in practice.  ...  In this paper, we present a novel approach to automatically extract, from a given binary executable, the algorithm related to a certain activity of the sample.  ...  That is, the focus of the analysis was on what output information a gadget must produce so that the analyst can interact with a remote server.  ... 
doi:10.1109/sp.2010.10 dblp:conf/sp/KolbitschHKK10 fatcat:j6yecsgbujeolgyfygalycqsea

Intrusion-Detection Systems [chapter]

Peng Ning, Sushil Jajodia
2012 Handbook of Computer Networks  
The series also serves as a forum for topics that may not have reached a level Researchers, as well as developers, are encouraged to contact Professor Sushil Jajodia with VULNERABILITY ANALYSIS  ...  and software assurance. of maturity to warrant a comprehensive textbook treatment. ideas for books under this series.  ...  For instance, one could express a prohibition for a role user to make the activity read pop on the view mail server in the context: &(v(remote access, &(internal access, n(working hours)), pop attack  ... 
doi:10.1002/9781118256107.ch26 fatcat:aeidzkegvfc27dqqmztiayv3dm

D6.1 System Orchestration And Management Design And Implementation

Carlos Parada, Isabel Borges, Francisco Fontes, George Tsolis, Michael J. McGrath, Vincenzo Riccobene, John Thomson, Julian Chesterfield, Joel Atherley, Manos Ragiadakos, Luis Tomas Bolivar, Livnat Peer (+13 others)
2018 Zenodo  
It concludes all the efforts done at WP6, finalizing the control framework, the SLA-base deployment design, and completes the symbolic execution checking and anomaly detection tools implementation.  ...  and pushes the changes to a remote git repository to which ManageIQ has access • ManageIQ pulls the Ansible playbook from the git repository and executes the Ansible playbook.  ...  checks for equivalence in arbitrary functions by using symbolic execution with Klee, and is heuristic because symbolic execution may not finish on traditional programs.  ... 
doi:10.5281/zenodo.1232116 fatcat:sdtzshzkljbennvyyi7qklryby

Mapping System Level Behaviors with Android APIs via System Call Dependence Graphs [article]

Bin Zhao
2019 arXiv   pre-print
The study also shows that our approach can effectively identify potential permission abusing, with almost negligible performance impact.  ...  Due to Android's open source feature and low barriers to entry for developers, millions of developers and third-party organizations have been attracted into the Android ecosystem.  ...  Spyware can stealthily collect data regarding user's behaviors and send those data to a remote server.  ... 
arXiv:1906.10238v1 fatcat:u24utk5h4jckximfu22rkjiy6i

Operating System Security

Trent Jaeger
2008 Synthesis Lectures on Information Security Privacy and Trust  
He is currently the architect for Solaris Trusted Extensions, and was one of the architects for Trusted Solaris and Role-Based Access Control.  ...  He is an associate editor with ACM TOIT and has been a guest editor of ACM TISSEC.  ...  Also, NFS is notorious for accepting any response to a remote file system request as being from a legitimate server [38] .  ... 
doi:10.2200/s00126ed1v01y200808spt001 fatcat:o7qgtis6zffr3disdujoq4izaa

POIROT

Sadegh M. Milajerdi, Birhanu Eshete, Rigel Gjomemo, V.N. Venkatakrishnan
2019 Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security - CCS '19  
Cyber threat intelligence (CTI) is being used to search for indicators of attacks that might have compromised an enterprise network for a long time without being discovered.  ...  However, these relationships are either completely overlooked in information gathering or not used for threat hunting.  ...  , a mail server and a web server) we monitored for one month.  ... 
doi:10.1145/3319535.3363217 dblp:conf/ccs/MilajerdiEGV19 fatcat:oqmz6uquiffctbwsg6nyklvg4e

Enabling Integrity for the Compressed Files in Cloud Server

S.K Prashanth
2013 IOSR Journal of Computer Engineering  
This scheme ensures that the storage at the client side is minimal which will be beneficial for thin clients.  ...  Cloud storage moves the users data to large data centers, which are remotely located and on which user does not have any control.  ...  For application purposes, data owner interacts with cloud server via CSP to access the data.  ... 
doi:10.9790/0661-1240105 fatcat:suxx6aa5kneybiskk2z4n6guce

Frontmatter [chapter]

Nilanjan Dey, Gitanjali Shinde, Parikshit Mahalle, Henning Olesen
2019 The Internet of Everything  
An electronic version of this book is freely available, thanks to the support of libraries working with Knowledge Unlatched.  ...  KU is a collaborative initiative designed to make high quality books Open Access. More information about the initiative can be found at www.knowledgeunlatched.org  ...  protocol to transmit urgent data Abstract: Sensor network is designed to provide monitoring services especially for natural disaster.  ... 
doi:10.1515/9783110628517-fm fatcat:3npfgq3o65f5pdbphf6pi4qn3a

Computer and Information Science, Vol. 2, No. 3, August 2009, all in one file, Part A

CIS Editor
2009 Computer and Information Science  
Implementation of the remote object The remote object can offer real implementation for every method regulated by the remote interface.  ...  Table 7 in the same condition for COMPAQ PROLIANT 800 server with additional 9G SCSI disk as slave.  ... 
doi:10.5539/cis.v2n3p0a fatcat:of4yymadgnaclmcglxlt6vzf2e

A Survey of Stealth Malware: Attacks, Mitigation Measures, and Steps Toward Autonomous Open World Solutions [article]

Ethan M. Rudd, Andras Rozsa, Manuel Günther, Terrance E. Boult
2016 arXiv   pre-print
While machine learning offers promising potential for increasingly autonomous solutions with improved generalization to new malware types, both at the network level and at the host level, our findings  ...  Policing the growing attack surface requires the development of efficient anti-malware solutions with improved generalization to detect novel types of malware and resolve these occurrences with as little  ...  with a C2 server at a known malicious address.  ... 
arXiv:1603.06028v2 fatcat:dyyemahzjze6bltxlwnnqgeyzy

Network Attacks Detection Methods Based on Deep Learning Techniques: A Survey

Yirui Wu, Dabao Wei, Jun Feng
2020 Security and Communication Networks  
Afterwards, we present some benchmark datasets with descriptions and compare the performance of representing approaches to show the current working state of attack detection methods with deep learning  ...  With the development of the fifth-generation networks and artificial intelligence technologies, new threats and challenges have emerged to wireless communication system, especially in cybersecurity.  ...  DGAs are popular to be used as malware tools to create a great quantity of domain names for tracking communication with C2 server.  ... 
doi:10.1155/2020/8872923 fatcat:dr5syy4pdzgktmjrpeyc2njvoe

Cellular, Wide-Area, and Non-Terrestrial IoT: A Survey on 5G Advances and the Road Towards 6G [article]

Mojtaba Vaezi, Amin Azari, Saeed R. Khosravirad, Mahyar Shirvanimoghaddam, M. Mahdi Azari, Danai Chasaki, Petar Popovski
2021 arXiv   pre-print
The solutions include grant-free access and channel coding for short-packet communications, non-orthogonal multiple access, and on-device intelligence.  ...  Specifically, wireless technology enhancements for providing IoT access in fifth-generation (5G) and beyond cellular networks, and communication networks over the unlicensed spectrum are presented.  ...  and cost consuming due to the need for human intervention, in some remote IoT applications, access to devices is limited.  ... 
arXiv:2107.03059v1 fatcat:i7rxlipsd5eojgpx3x5yxioozq

Botnet Detection in Anonymous Networks

Katharina Kuhnert, Jessica Steinberger, Harald Baier
2018 Autonomous Infrastructure, Management and Security  
One of the goals of AIMS is to provide early researchers with constructive feedback by senior scientists and give them the possibility to grow in the research community by means of targeted lab sessions  ...  This work is also funded by the national project TEC2015-71329-C2-2-R (MINECO/FEDER).  ...  for the DNS (SAND) project, phase 3 (http://www.sand-project.nl).  ... 
dblp:conf/aims/KuhnertSB18 fatcat:745qy2tejngb5apqlse4sn3djm

MRD Hashing [chapter]

Rei Safavi-Naini, Shahram Bakhtiari, Chris Charnes
1998 Lecture Notes in Computer Science  
Access Services Open Doors for Crackers' H F uhs, Information Security Bulletin v 2 n o 5 Oct 97 pp 47 48 This is a note on some potential problems with remote access control. 071338`Addressing information  ...  The proposed process, based on the concepts of similarity and abstraction, produces authorizations which allow federated users to execute on remote objects the same accesses they can exercise on similar  ... 
doi:10.1007/3-540-69710-1_10 fatcat:mezaspbmk5c4nhu227gayoeejq
« Previous Showing results 1 — 15 out of 37 results