Sciweavers

13 search results - page 1 / 3
» Detecting Kernel-Level Rootkits Through Binary Analysis
Sort
View
ACSAC
2004
IEEE
14 years 2 months ago
Detecting Kernel-Level Rootkits Through Binary Analysis
Christopher Krügel, William K. Robertson, Gio...
SIGDIAL
2010
13 years 8 months ago
Detection of time-pressure induced stress in speech via acoustic indicators
We use automatically extracted acoustic features to detect speech which is generated under stress, achieving 76.24% accuracy with a binary logistic regression. Our data are task-o...
Matthew Frampton, Sandeep Sripada, Ricardo Augusto...
CCS
2007
ACM
14 years 5 months ago
Polyglot: automatic extraction of protocol message format using dynamic binary analysis
Protocol reverse engineering, the process of extracting the application-level protocol used by an implementation, without access to the protocol specification, is important for m...
Juan Caballero, Heng Yin, Zhenkai Liang, Dawn Xiao...
RAID
2010
Springer
13 years 9 months ago
Detecting the Onset of Infection for Secure Hosts
Abstract. Software flaws in applications such as a browser may be exploited by attackers to launch drive-by-download (DBD), which has become the major vector of malware infection....
Kui Xu, Qiang Ma, Danfeng (Daphne) Yao
ACSAC
2005
IEEE
14 years 4 months ago
Countering Trusting Trust through Diverse Double-Compiling
An Air Force evaluation of Multics, and Ken Thompson’s famous Turing award lecture “Reflections on Trusting Trust,” showed that compilers can be subverted to insert maliciou...
David Wheeler