Remote code-injection attacks are one of the most frequently used attacking vectors in computer security. To detect and analyze injected code (often called shellcode), some researc...
Abstract. Autonomous spreading malware in the form of bots or worms is a constant threat in today’s Internet. In the form of botnets, networks of compromised machines that can be...
: Large Critical Complex Infrastructures are increasingly dependent on IP networks. Reliability by redundancy and tolerance are an imperative for such dependable networks. In order...
Tobias Chyssler, Stefan Burschka, Michael Semling,...
This paper presents ViSe, a virtual security testbed, and demonstrates how it can be used to efficiently study computer attacks and suspect tools as part of a computer crime recons...
Abstract. As state-of-the-art attack detection technology becomes more prevalent, attackers are likely to evolve, employing techniques such as polymorphism and metamorphism to evad...
Michalis Polychronakis, Kostas G. Anagnostakis, Ev...