Sciweavers

2938 search results - page 29 / 588
» On obfuscating point functions
Sort
View
ACSAC
2007
IEEE
14 years 2 months ago
MetaAware: Identifying Metamorphic Malware
Detection of malicious software (malware) by the use of static signatures is often criticized for being overly simplistic. Available methods of obfuscating code (so-called metamor...
Qinghua Zhang, Douglas S. Reeves
SP
2005
IEEE
100views Security Privacy» more  SP 2005»
14 years 1 months ago
Polygraph: Automatically Generating Signatures for Polymorphic Worms
It is widely believed that content-signature-based intrusion detection systems (IDSes) are easily evaded by polymorphic worms, which vary their payload on every infection attempt....
James Newsome, Brad Karp, Dawn Xiaodong Song
GECCO
2006
Springer
124views Optimization» more  GECCO 2006»
13 years 11 months ago
On evolving buffer overflow attacks using genetic programming
In this work, we employed genetic programming to evolve a "white hat" attacker; that is to say, we evolve variants of an attack with the objective of providing better de...
Hilmi Günes Kayacik, Malcolm I. Heywood, A. N...
CLEF
2010
Springer
13 years 8 months ago
A Textual-Based Similarity Approach for Efficient and Scalable External Plagiarism Analysis - Lab Report for PAN at CLEF 2010
In this paper we present an approach to detect external plagiarism based on textual similarity. This is an efficient and precise method that can be applied over large sets of docum...
Daniel Micol, Óscar Ferrández, Ferna...
VISUALIZATION
2003
IEEE
14 years 29 days ago
A Frequency-Sensitive Point Hierarchy for Images and Volumes
This paper introduces a method for converting an image or volume sampled on a regular grid into a space-efficient irregular point hierarchy. The conversion process retains the ori...
Tomihisa Welsh, Klaus Mueller