Sciweavers

191 search results - page 37 / 39
» On Detecting Camouflaging Worm
Sort
View
CCS
2007
ACM
14 years 2 months ago
Memsherlock: an automated debugger for unknown memory corruption vulnerabilities
Software vulnerabilities have been the main contributing factor to the Internet security problems such as fast spreading worms. Among these software vulnerabilities, memory corrup...
Emre Can Sezer, Peng Ning, Chongkyung Kil, Jun Xu
PEPM
2010
ACM
14 years 5 months ago
Context-sensitive analysis of obfuscated x86 executables
A method for context-sensitive analysis of binaries that may have obfuscated procedure call and return operations is presented. Such binaries may use operators to directly manipul...
Arun Lakhotia, Davidson R. Boccardo, Anshuman Sing...
FGR
2008
IEEE
229views Biometrics» more  FGR 2008»
14 years 3 months ago
A high-resolution 3D dynamic facial expression database
Face information processing relies on the quality of data resource. From the data modality point of view, a face database can be 2D or 3D, and static or dynamic. From the task poi...
Lijun Yin, Xiaochen Chen, Yi Sun, Tony Worm, Micha...
SP
2007
IEEE
135views Security Privacy» more  SP 2007»
14 years 2 months ago
Exploring Multiple Execution Paths for Malware Analysis
Malicious code (or malware) is defined as software that fulfills the deliberately harmful intent of an attacker. Malware analysis is the process of determining the behavior and ...
Andreas Moser, Christopher Krügel, Engin Kird...
NDSS
2006
IEEE
14 years 2 months ago
Protocol-Independent Adaptive Replay of Application Dialog
For many applications—including recognizing malware variants, determining the range of system versions vulnerable to a given attack, testing defense mechanisms, and filtering m...
Weidong Cui, Vern Paxson, Nicholas Weaver, Randy H...