Sciweavers

68 search results - page 4 / 14
» Attacks and Forensic Analysis for Multimedia Content Protect...
Sort
View
USS
2008
13 years 9 months ago
Lest We Remember: Cold Boot Attacks on Encryption Keys
Contrary to popular assumption, DRAMs used in most modern computers retain their contents for several seconds after power is lost, even at room temperature and even if removed fro...
J. Alex Halderman, Seth D. Schoen, Nadia Heninger,...
DRM
2004
Springer
14 years 22 days ago
Analysis of an incentives-based secrets protection system
Once electronic content has been released it is very difficult to prevent copies of the content from being widely distributed. Such distribution can cause economic harm to the con...
N. Boris Margolin, Matthew Wright, Brian Neil Levi...
IWDW
2005
Springer
14 years 25 days ago
Performance Study on Multimedia Fingerprinting Employing Traceability Codes
Digital fingerprinting is a tool to protect multimedia content from illegal redistribution by uniquely marking copies of the content distributed to each user. Collusion attack is ...
Shan He, Min Wu
TNC
2004
120views Education» more  TNC 2004»
13 years 8 months ago
Realtime Intrusion-Forensics: A First Prototype Implementation (based on a stack-based NIDS)
The function of a Network Intrusion Detection System (NIDS) is to identify any misuse and abnormal behavior determined as an attack to a network segment or network host. The propo...
Udo Payer
KDD
2009
ACM
173views Data Mining» more  KDD 2009»
13 years 12 months ago
Malware detection using statistical analysis of byte-level file content
Commercial anti-virus software are unable to provide protection against newly launched (a.k.a “zero-day”) malware. In this paper, we propose a novel malware detection techniqu...
S. Momina Tabish, M. Zubair Shafiq, Muddassar Faro...