Sciweavers

15 search results - page 3 / 3
» isw 2007
Sort
View
ISW
2007
Springer
14 years 2 months ago
On the Concept of Software Obfuscation in Computer Security
Abstract. Program obfuscation is a semantic-preserving transformation aimed at bringing a program into such a form, which impedes the understanding of its algorithm and data struct...
Nikolay Kuzurin, Alexander Shokurov, Nikolay P. Va...
ISW
2007
Springer
14 years 2 months ago
New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Py
The stream ciphers Py, Py6 designed by Biham and Seberry were promising candidates in the ECRYPT-eSTREAM project because of their impressive speed. Since their publication in Apri...
Gautham Sekar, Souradyuti Paul, Bart Preneel
ISW
2007
Springer
14 years 2 months ago
Detecting System Emulators
Malware analysis is the process of determining the behavior and purpose of a given malware sample (such as a virus, worm, or Trojan horse). This process is a necessary step to be a...
Thomas Raffetseder, Christopher Krügel, Engin...
ISW
2007
Springer
14 years 2 months ago
Queue Management as a DoS Counter-Measure?
In this paper, we study the performance of timeout-based queue management practices in the context of flood denial-of-service (DoS) attacks on connection-oriented protocols, where...
Daniel Boteanu, José M. Fernandez, John McH...
ISW
2007
Springer
14 years 2 months ago
Enabling Fairer Digital Rights Management with Trusted Computing
Abstract. Today, digital content is routinely distributed over the Internet, and consumed in devices based on open platforms. However, on open platforms users can run exploits, rec...
Ahmad-Reza Sadeghi, Marko Wolf, Christian Stü...