Sciweavers

252 search results - page 7 / 51
» Experimenting with Server-Aided Signatures
Sort
View
ICASSP
2009
IEEE
14 years 2 months ago
Geometric distortion signatures for printer identification
We present a forensic technique for analyzing a printed image in order to trace the originating printer. Our method, which is applicable for commonly used electrophotographic (EP)...
Orhan Bulan, Junwen Mao, Gaurav Sharma
SP
2006
IEEE
132views Security Privacy» more  SP 2006»
14 years 1 months ago
Towards Automatic Generation of Vulnerability-Based Signatures
In this paper we explore the problem of creating vulnerability signatures. A vulnerability signature matches all exploits of a given vulnerability, even polymorphic or metamorphic...
David Brumley, James Newsome, Dawn Xiaodong Song, ...
TDSC
2010
172views more  TDSC 2010»
13 years 2 months ago
Proactive Detection of Computer Worms Using Model Checking
Although recent estimates are speaking of 200,000 different viruses, worms, and Trojan horses, the majority of them are variants of previously existing malware. As these variants m...
Johannes Kinder, Stefan Katzenbeisser, Christian S...
ICDAR
2003
IEEE
14 years 23 days ago
An HMM On-line Signature Verifier Incorporating Signature Trajectories
Authentication of individuals is rapidly becoming an important issue. On-line signature verification is one of the methods that use biometric features. This paper proposes a new H...
Daigo Muramatsu, Takashi Matsumoto
VLSID
2001
IEEE
82views VLSI» more  VLSID 2001»
14 years 7 months ago
Efficient Signature-Based Fault Diagnosis Using Variable Size Windows
A technique for signature based diagnosis using windows of different sizes is presented. It allows to obtain increased diagnostic information from a given test at a lower cost, wi...
Thomas Clouqueur, Ozen Ercevik, Kewal K. Saluja, H...