Sciweavers

326 search results - page 6 / 66
» Testing malware detectors
Sort
View
ISW
2007
Springer
14 years 1 months ago
Detecting System Emulators
Malware analysis is the process of determining the behavior and purpose of a given malware sample (such as a virus, worm, or Trojan horse). This process is a necessary step to be a...
Thomas Raffetseder, Christopher Krügel, Engin...
EVOW
2009
Springer
13 years 11 months ago
Testing Detector Parameterization Using Evolutionary Exploit Generation
Abstract. The testing of anomaly detectors is considered from the perspective of a Multi-objective Evolutionary Exploit Generator (EEG). Such a framework provides users of anomaly ...
Hilmi Günes Kayacik, A. Nur Zincir-Heywood, M...
METRICS
2003
IEEE
14 years 29 days ago
When Can We Test Less?
When it is impractical to rigorously assess all parts of complex systems, test engineers use defect detectors to focus their limited resources. In this article, we define some pr...
Tim Menzies, Justin S. Di Stefano, Kareem Ammar, K...
RAID
2010
Springer
13 years 6 months ago
Hybrid Analysis and Control of Malware
Abstract. Malware attacks necessitate extensive forensic analysis efforts that are manual-labor intensive because of the analysis-resistance techniques that malware authors employ....
Kevin A. Roundy, Barton P. Miller
ICASSP
2011
IEEE
12 years 11 months ago
Robust adaptive event detection in non-intrusive load monitoring for energy aware smart facilities
This paper presents a robust adaptive goodness-of-fit (GOF) χ2 test event detector for non-intrusive load monitoring applications. We derive a closed form for the decision thres...
Yuanwei Jin, Eniye Tebekaemi, Mario Berges, Lucio ...