Sciweavers

42 search results - page 5 / 9
» Revealing Packed Malware
Sort
View
ICCSA
2005
Springer
14 years 1 months ago
A Novel Delaunay Simplex Technique for Detection of Crystalline Nuclei in Dense Packings of Spheres
The paper presents a new approach for revealing regions (nuclei) of crystalline structures in computer models of dense packings of spherical atoms using the Voronoi-Delaunay method...
Alexey V. Anikeenko, Marina L. Gavrilova, Nikolai ...
MICRO
2008
IEEE
124views Hardware» more  MICRO 2008»
14 years 1 months ago
SHARK: Architectural support for autonomic protection against stealth by rootkit exploits
Rootkits have become a growing concern in cyber-security. Typically, they exploit kernel vulnerabilities to gain root privileges of a system and conceal malware’s activities fro...
Vikas R. Vasisht, Hsien-Hsin S. Lee
RAID
2010
Springer
13 years 5 months ago
BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection
We introduce BotSwindler, a bait injection system designed to delude and detect crimeware by forcing it to reveal during the exploitation of monitored information. The implementati...
Brian M. Bowen, Pratap V. Prabhu, Vasileios P. Kem...
ISSS
1999
IEEE
131views Hardware» more  ISSS 1999»
13 years 11 months ago
Compressed Code Execution on DSP Architectures
Decreasing the program size has become an important goal in the design of embedded systems target to mass production. This problem has led to a number of efforts aimed at designin...
Paulo Centoducatte, Ricardo Pannain, Guido Araujo
BMCBI
2010
86views more  BMCBI 2010»
13 years 7 months ago
Protein binding hot spots and the residue-residue pairing preference: a water exclusion perspective
Background: A protein binding hot spot is a small cluster of residues tightly packed at the center of the interface between two interacting proteins. Though a hot spot constitutes...
Qian Liu, Jinyan Li