Sciweavers

42 search results - page 7 / 9
» PoX: Protecting users from malicious Facebook applications
Sort
View
WISEC
2010
ACM
14 years 2 months ago
pBMDS: a behavior-based malware detection system for cellphone devices
Computing environments on cellphones, especially smartphones, are becoming more open and general-purpose, thus they also become attractive targets of malware. Cellphone malware no...
Liang Xie, Xinwen Zhang, Jean-Pierre Seifert, Senc...
CCS
2009
ACM
14 years 2 months ago
Physically restricted authentication with trusted hardware
Modern computer systems permit users to access protected information from remote locations. In certain secure environments, it would be desirable to restrict this access to a part...
Michael S. Kirkpatrick, Elisa Bertino
CORR
2011
Springer
167views Education» more  CORR 2011»
12 years 11 months ago
Negative Database for Data Security
Data Security is a major issue in any web-based application. There have been approaches to handle intruders in any system, however, these approaches are not fully trustable; evide...
Anup Patel, Niveeta Sharma, Magdalini Eirinaki
CCS
2007
ACM
14 years 1 months ago
SecureBus: towards application-transparent trusted computing with mandatory access control
The increasing number of software-based attacks has attracted substantial efforts to prevent applications from malicious interference. For example, Trusted Computing (TC) technolo...
Xinwen Zhang, Michael J. Covington, Songqing Chen,...
RAID
2005
Springer
14 years 1 months ago
FLIPS: Hybrid Adaptive Intrusion Prevention
Intrusion detection systems are fundamentally passive and fail–open. Because their primary task is classification, they do nothing to prevent an attack from succeeding. An intru...
Michael E. Locasto, Ke Wang, Angelos D. Keromytis,...