Sciweavers

817 search results - page 29 / 164
» Malware behaviour analysis
Sort
View
ACSAC
2008
IEEE
14 years 4 months ago
Soft-Timer Driven Transient Kernel Control Flow Attacks and Defense
A new class of stealthy kernel-level malware, called transient kernel control flow attacks, uses dynamic soft timers to achieve significant work while avoiding any persistent ch...
Jinpeng Wei, Bryan D. Payne, Jonathon Giffin, Calt...
RAID
2010
Springer
13 years 7 months ago
BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection
We introduce BotSwindler, a bait injection system designed to delude and detect crimeware by forcing it to reveal during the exploitation of monitored information. The implementati...
Brian M. Bowen, Pratap V. Prabhu, Vasileios P. Kem...
GAMEON
2008
13 years 11 months ago
Automatable Evaluation Method Oriented toward Behaviour Believability for Video Games
Classic evaluation methods of believable agents are time-consuming because they involve many human to judge agents. They are well suited to validate work on new believable behavio...
Fabien Tencé, Cédric Buche
LOPSTR
2001
Springer
14 years 2 months ago
Computing Environment-Aware Agent Behaviours with Logic Program Updates
Abstract. The ability of reacting to changes in the external environment is of crucial importance within the context of software agents. Such feature must however be suitably recon...
José Júlio Alferes, Antonio Brogi, J...
ICPR
2006
IEEE
14 years 11 months ago
A Combined Bayesian Markovian Approach for Behaviour Recognition
Numerous techniques exist which can be used for the task of behavioural analysis and recognition. Common amongst these are Bayesian networks and Hidden Markov Models. Although the...
David Paul Young, James M. Ferryman, Nicholas L. C...