Sciweavers

832 search results - page 93 / 167
» Effect of Malicious Synchronization
Sort
View
VIROLOGY
2008
121views more  VIROLOGY 2008»
13 years 10 months ago
Constructing malware normalizers using term rewriting
A malware mutation engine is able to transform a malicious program to create a different version of the program. Such mutation engines are used at distribution sites or in self-pro...
Andrew Walenstein, Rachit Mathur, Mohamed R. Chouc...
SAC
2008
ACM
13 years 9 months ago
The tale of the weather worm
How humans behave when faced with a disaster, natural or man-made, can be exploited automatically by news-aware malicious software. We introduce weather worms, worms that can auto...
Joe Szabo, John Aycock, Randal Acton, Jörg De...
CORR
2010
Springer
189views Education» more  CORR 2010»
13 years 8 months ago
Robust PCA via Outlier Pursuit
Singular Value Decomposition (and Principal Component Analysis) is one of the most widely used techniques for dimensionality reduction: successful and efficiently computable, it ...
Huan Xu, Constantine Caramanis, Sujay Sanghavi
ML
2010
ACM
155views Machine Learning» more  ML 2010»
13 years 8 months ago
On the infeasibility of modeling polymorphic shellcode - Re-thinking the role of learning in intrusion detection systems
Current trends demonstrate an increasing use of polymorphism by attackers to disguise their exploits. The ability for malicious code to be easily, and automatically, transformed in...
Yingbo Song, Michael E. Locasto, Angelos Stavrou, ...
TDSC
2010
101views more  TDSC 2010»
13 years 8 months ago
Steward: Scaling Byzantine Fault-Tolerant Replication to Wide Area Networks
—This paper presents the first hierarchical Byzantine fault-tolerant replication architecture suitable to systems that span multiple wide area sites. The architecture confines ...
Yair Amir, Claudiu Danilov, Danny Dolev, Jonathan ...