Sciweavers

326 search results - page 32 / 66
» Testing malware detectors
Sort
View
SP
2010
IEEE
182views Security Privacy» more  SP 2010»
14 years 27 days ago
All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but Might Have Been Afraid to Ask)
—Dynamic taint analysis and forward symbolic execution are quickly becoming staple techniques in security analyses. Example applications of dynamic taint analysis and forward sym...
Edward J. Schwartz, Thanassis Avgerinos, David Bru...
DIMVA
2007
13 years 10 months ago
A Study of Malcode-Bearing Documents
By exploiting the object-oriented dynamic composability of modern document applications and formats, malcode hidden in otherwise inconspicuous documents can reach third-party appli...
Wei-Jen Li, Salvatore J. Stolfo, Angelos Stavrou, ...
MM
2009
ACM
178views Multimedia» more  MM 2009»
14 years 3 months ago
Semantic context transfer across heterogeneous sources for domain adaptive video search
Automatic video search based on semantic concept detectors has recently received significant attention. Since the number of available detectors is much smaller than the size of h...
Yu-Gang Jiang, Chong-Wah Ngo, Shih-Fu Chang
KDD
2008
ACM
195views Data Mining» more  KDD 2008»
14 years 9 months ago
Anomaly pattern detection in categorical datasets
We propose a new method for detecting patterns of anomalies in categorical datasets. We assume that anomalies are generated by some underlying process which affects only a particu...
Kaustav Das, Jeff G. Schneider, Daniel B. Neill
ICCV
2007
IEEE
14 years 11 months ago
Real-time Accurate Object Detection using Multiple Resolutions
We propose a multi-resolution framework inspired by human visual search for general object detection. Different resolutions are represented using a coarse-to-fine feature hierarch...
Wei Zhang 0002, Gregory J. Zelinsky, Dimitris Sama...