Sciweavers

94 search results - page 10 / 19
» Performance Forensics
Sort
View
PASTE
2010
ACM
14 years 18 days ago
Extracting compiler provenance from program binaries
We present a novel technique that identifies the source compiler of program binaries, an important element of program provenance. Program provenance answers fundamental questions...
Nathan E. Rosenblum, Barton P. Miller, Xiaojin Zhu
ACSAC
1999
IEEE
13 years 12 months ago
Adding Availability to Log Services of Untrusted Machines
Uncorrupted log files are the critical system component for computer forensics in case of intrusion and for real time system monitoring and auditing. Protection from tampering wit...
Arianna Arona, Danilo Bruschi, Emilia Rosti
DAS
2006
Springer
13 years 9 months ago
Extraction and Analysis of Document Examiner Features from Vector Skeletons of Grapheme 'th'
Abstract. This paper presents a study of 25 structural features extracted from samples of grapheme `th' that correspond to features commonly used by forensic document examiner...
Vladimir Pervouchine, Graham Leedham
RAID
2010
Springer
13 years 6 months ago
Hybrid Analysis and Control of Malware
Abstract. Malware attacks necessitate extensive forensic analysis efforts that are manual-labor intensive because of the analysis-resistance techniques that malware authors employ....
Kevin A. Roundy, Barton P. Miller
ICMCS
2007
IEEE
136views Multimedia» more  ICMCS 2007»
14 years 1 months ago
Improvements on Sensor Noise Based Source Camera Identification
In [1], a novel method for identifying the source camera of a digital image is proposed. The method is based on first extracting imaging sensor’s pattern noise from many images...
Yagiz Sutcu, Sevinc Bayram, Husrev T. Sencar, Nasi...