Sciweavers

1422 search results - page 220 / 285
» Information security and risk management
Sort
View

Publication
148views
13 years 10 months ago
ADSandbox: sandboxing JavaScript to fight malicious websites
We present ADSandbox, an analysis system for malicious websites that focusses on detecting attacks through JavaScript. Since, in contrast to Java, JavaScript does not have any bui...
ESORICS
2008
Springer
13 years 10 months ago
A Framework for the Analysis of Mix-Based Steganographic File Systems
Abstract. The goal of Steganographic File Systems (SFSs) is to protect users from coercion attacks by providing plausible deniability on the existence of hidden files. We consider ...
Claudia Díaz, Carmela Troncoso, Bart Prenee...
WORM
2003
13 years 10 months ago
Experiences with worm propagation simulations
Fast Internet worms are a relatively new threat to Internet infrastructure and hosts. We discuss motivation and possibilities to study the behaviour of such worms and degrees of f...
Arno Wagner, Thomas Dübendorfer, Bernhard Pla...
WORM
2003
13 years 10 months ago
Detection of injected, dynamically generated, and obfuscated malicious code
This paper presents DOME, a host-based technique for detecting several general classes of malicious code in software executables. DOME uses static analysis to identify the locatio...
Jesse C. Rabek, Roger I. Khazan, Scott M. Lewandow...
DSS
2006
170views more  DSS 2006»
13 years 9 months ago
Adoption of internet banking: An empirical study in Hong Kong
This study investigates how customers perceive and adopt Internet Banking (IB) in Hong Kong. We developed a theoretical model based on the Technology Acceptance Model (TAM) with a...
T. C. Edwin Cheng, David Y. C. Lam, Andy C. L. Yeu...