A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
SYSTEM CALL DEPENDENCE GRAPH BASED BEHAVIOR DECOMPOSITION OF ANDROID APPLICATIONS
2019
Zenodo
The study also shows that our approach can effectively identify potential permission abusing, with an almost negligible performance impact. ...
Millions of developers and third-party organizations have flooded into the Android ecosystem due to Android's open-source feature and low barriers to entry for developers. .However, that also attracts ...
Spyware can stealthily collect data regarding user's behaviors and send those data to a remote server. ...
doi:10.5281/zenodo.3365780
fatcat:f3n33dfnjfey5ep3daqbrjl2ru
Inspector Gadget: Automated Extraction of Proprietary Gadgets from Malware Binaries
2010
2010 IEEE Symposium on Security and Privacy
Our evaluation with several real-world samples demonstrates that our approach is versatile and useful in practice. ...
In this paper, we present a novel approach to automatically extract, from a given binary executable, the algorithm related to a certain activity of the sample. ...
That is, the focus of the analysis was on what output information a gadget must produce so that the analyst can interact with a remote server. ...
doi:10.1109/sp.2010.10
dblp:conf/sp/KolbitschHKK10
fatcat:j6yecsgbujeolgyfygalycqsea
Intrusion-Detection Systems
[chapter]
2012
Handbook of Computer Networks
The series also serves as a forum for topics that may not have reached a level Researchers, as well as developers, are encouraged to contact Professor Sushil Jajodia with VULNERABILITY ANALYSIS ...
and software assurance. of maturity to warrant a comprehensive textbook treatment. ideas for books under this series. ...
For instance, one could express a prohibition for a role user to make the activity read pop on the view mail server in the context:
&(v(remote access, &(internal access, n(working hours)), pop attack ...
doi:10.1002/9781118256107.ch26
fatcat:aeidzkegvfc27dqqmztiayv3dm
D6.1 System Orchestration And Management Design And Implementation
2018
Zenodo
It concludes all the efforts done at WP6, finalizing the control framework, the SLA-base deployment design, and completes the symbolic execution checking and anomaly detection tools implementation. ...
and pushes the changes to a remote git repository to which ManageIQ has access • ManageIQ pulls the Ansible playbook from the git repository and executes the Ansible playbook. ...
checks for equivalence in arbitrary functions by using symbolic execution with Klee, and is heuristic because symbolic execution may not finish on traditional programs. ...
doi:10.5281/zenodo.1232116
fatcat:sdtzshzkljbennvyyi7qklryby
Mapping System Level Behaviors with Android APIs via System Call Dependence Graphs
[article]
2019
arXiv
pre-print
The study also shows that our approach can effectively identify potential permission abusing, with almost negligible performance impact. ...
Due to Android's open source feature and low barriers to entry for developers, millions of developers and third-party organizations have been attracted into the Android ecosystem. ...
Spyware can stealthily collect data regarding user's behaviors and send those data to a remote server. ...
arXiv:1906.10238v1
fatcat:u24utk5h4jckximfu22rkjiy6i
Operating System Security
2008
Synthesis Lectures on Information Security Privacy and Trust
He is currently the architect for Solaris Trusted Extensions, and was one of the architects for Trusted Solaris and Role-Based Access Control. ...
He is an associate editor with ACM TOIT and has been a guest editor of ACM TISSEC. ...
Also, NFS is notorious for accepting any response to a remote file system request as being from a legitimate server [38] . ...
doi:10.2200/s00126ed1v01y200808spt001
fatcat:o7qgtis6zffr3disdujoq4izaa
POIROT
2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security - CCS '19
Cyber threat intelligence (CTI) is being used to search for indicators of attacks that might have compromised an enterprise network for a long time without being discovered. ...
However, these relationships are either completely overlooked in information gathering or not used for threat hunting. ...
, a mail server and a web server) we monitored for one month. ...
doi:10.1145/3319535.3363217
dblp:conf/ccs/MilajerdiEGV19
fatcat:oqmz6uquiffctbwsg6nyklvg4e
Enabling Integrity for the Compressed Files in Cloud Server
2013
IOSR Journal of Computer Engineering
This scheme ensures that the storage at the client side is minimal which will be beneficial for thin clients. ...
Cloud storage moves the users data to large data centers, which are remotely located and on which user does not have any control. ...
For application purposes, data owner interacts with cloud server via CSP to access the data. ...
doi:10.9790/0661-1240105
fatcat:suxx6aa5kneybiskk2z4n6guce
Frontmatter
[chapter]
2019
The Internet of Everything
An electronic version of this book is freely available, thanks to the support of libraries working with Knowledge Unlatched. ...
KU is a collaborative initiative designed to make high quality books Open Access. More information about the initiative can be found at www.knowledgeunlatched.org ...
protocol to transmit urgent data Abstract: Sensor network is designed to provide monitoring services especially for natural disaster. ...
doi:10.1515/9783110628517-fm
fatcat:3npfgq3o65f5pdbphf6pi4qn3a
Computer and Information Science, Vol. 2, No. 3, August 2009, all in one file, Part A
2009
Computer and Information Science
Implementation of the remote object The remote object can offer real implementation for every method regulated by the remote interface. ...
Table 7 in the same condition for COMPAQ PROLIANT 800 server with additional 9G SCSI disk as slave. ...
doi:10.5539/cis.v2n3p0a
fatcat:of4yymadgnaclmcglxlt6vzf2e
A Survey of Stealth Malware: Attacks, Mitigation Measures, and Steps Toward Autonomous Open World Solutions
[article]
2016
arXiv
pre-print
While machine learning offers promising potential for increasingly autonomous solutions with improved generalization to new malware types, both at the network level and at the host level, our findings ...
Policing the growing attack surface requires the development of efficient anti-malware solutions with improved generalization to detect novel types of malware and resolve these occurrences with as little ...
with a C2 server at a known malicious address. ...
arXiv:1603.06028v2
fatcat:dyyemahzjze6bltxlwnnqgeyzy
Network Attacks Detection Methods Based on Deep Learning Techniques: A Survey
2020
Security and Communication Networks
Afterwards, we present some benchmark datasets with descriptions and compare the performance of representing approaches to show the current working state of attack detection methods with deep learning ...
With the development of the fifth-generation networks and artificial intelligence technologies, new threats and challenges have emerged to wireless communication system, especially in cybersecurity. ...
DGAs are popular to be used as malware tools to create a great quantity of domain names for tracking communication with C2 server. ...
doi:10.1155/2020/8872923
fatcat:dr5syy4pdzgktmjrpeyc2njvoe
Cellular, Wide-Area, and Non-Terrestrial IoT: A Survey on 5G Advances and the Road Towards 6G
[article]
2021
arXiv
pre-print
The solutions include grant-free access and channel coding for short-packet communications, non-orthogonal multiple access, and on-device intelligence. ...
Specifically, wireless technology enhancements for providing IoT access in fifth-generation (5G) and beyond cellular networks, and communication networks over the unlicensed spectrum are presented. ...
and cost consuming due to the need for human intervention, in some remote IoT applications, access to devices is limited. ...
arXiv:2107.03059v1
fatcat:i7rxlipsd5eojgpx3x5yxioozq
Botnet Detection in Anonymous Networks
2018
Autonomous Infrastructure, Management and Security
One of the goals of AIMS is to provide early researchers with constructive feedback by senior scientists and give them the possibility to grow in the research community by means of targeted lab sessions ...
This work is also funded by the national project TEC2015-71329-C2-2-R (MINECO/FEDER). ...
for the DNS (SAND) project, phase 3 (http://www.sand-project.nl). ...
dblp:conf/aims/KuhnertSB18
fatcat:745qy2tejngb5apqlse4sn3djm
MRD Hashing
[chapter]
1998
Lecture Notes in Computer Science
Access Services Open Doors for Crackers' H F uhs, Information Security Bulletin v 2 n o 5 Oct 97 pp 47 48 This is a note on some potential problems with remote access control. 071338`Addressing information ...
The proposed process, based on the concepts of similarity and abstraction, produces authorizations which allow federated users to execute on remote objects the same accesses they can exercise on similar ...
doi:10.1007/3-540-69710-1_10
fatcat:mezaspbmk5c4nhu227gayoeejq
« Previous
Showing results 1 — 15 out of 37 results