Sciweavers

126 search results - page 22 / 26
» A Probabilistic Method for Detecting Anomalous Program Behav...
Sort
View
ECOOP
2007
Springer
14 years 1 months ago
Morphing: Safely Shaping a Class in the Image of Others
We present MJ: a language for specifying general classes whose members are produced by iterating over members of other classes. We call this technique “class morphing” or just ...
Shan Shan Huang, David Zook, Yannis Smaragdakis
MOBIHOC
2009
ACM
14 years 8 months ago
Optimal monitoring in multi-channel multi-radio wireless mesh networks
Wireless mesh networks (WMN) are finding increasing usage in city-wide deployments for providing network connectivity. Mesh routers in WMNs typically use multiple wireless channel...
Dong-Hoon Shin, Saurabh Bagchi
ACSAC
2006
IEEE
14 years 1 months ago
PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware
Modern malware often hide the malicious portion of their program code by making it appear as data at compiletime and transforming it back into executable code at runtime. This obf...
Paul Royal, Mitch Halpin, David Dagon, Robert Edmo...
NSDI
2004
13 years 8 months ago
Measurement and Analysis of Spyware in a University Environment
Over the past few years, a relatively new computing phenomenon has gained momentum: the spread of "spyware." Though most people are aware of spyware, the research commun...
Stefan Saroiu, Steven D. Gribble, Henry M. Levy
SIGSOFT
2004
ACM
14 years 24 days ago
Correlation exploitation in error ranking
Static program checking tools can find many serious bugs in software, but due to analysis limitations they also frequently emit false error reports. Such false positives can easi...
Ted Kremenek, Ken Ashcraft, Junfeng Yang, Dawson R...