Sciweavers

47 search results - page 2 / 10
» Hunting Trojan Horses
Sort
View
INFORMATICASI
2002
66views more  INFORMATICASI 2002»
13 years 7 months ago
Trojan horse attacks on software for electronic signatures
Adrian Spalka, Armin B. Cremers, Hanno Langweg
ECIS
2000
13 years 9 months ago
Full Bindingness and Confidentiality
As electronic commerce will increase, players will increasingly wish to have signed documents and strong encryption. According to current knowledge, it must be expected that the co...
Arnd Weber
WORM
2004
13 years 9 months ago
WORM vs. WORM: preliminary study of an active counter-attack mechanism
Self-propagating computer worms have been terrorizing the Internet for the last several years. With the increasing density, inter-connectivity and bandwidth of the Internet combin...
Frank Castaneda, Emre Can Sezer, Jun Xu
CSFW
1992
IEEE
13 years 11 months ago
Causal Security
This paper gives a new definition of Security, which takes causal information into account. The new definition can be used to determine the security of nondeterministic concurrent...
Miranda Mowbray
ISSTA
2012
ACM
11 years 10 months ago
A quantitative study of accuracy in system call-based malware detection
Over the last decade, there has been a significant increase in the number and sophistication of malware-related attacks and infections. Many detection techniques have been propos...
Davide Canali, Andrea Lanzi, Davide Balzarotti, Ch...