Sciweavers

9 search results - page 1 / 2
» sicherheit 2010
Sort
View
SICHERHEIT
2010
15 years 5 days ago
Session Fixation - The Forgotten Vulnerability?
Michael Schrank, Bastian Braun, Martin Johns, Joac...
SICHERHEIT
2010
15 years 5 days ago
Bedrohungsmodellierung (Threat Modeling) in der Softwareentwicklung
: Threat Modeling erm
Fabian Schwab, Alexander Findeisen, Peter Sakal, H...
SICHERHEIT
2010
15 years 5 days ago
Amun: Automatic Capturing of Malicious Software
: This paper describes the low-interaction server honeypot Amun. Through the use of emulated vulnerabilities Amun aims at capturing malware in an automated fashion. The use of the ...
Jan Göbel
SICHERHEIT
2010
15 years 5 days ago
A Malware Instruction Set for Behavior-Based Analysis
We introduce a new representation for monitored behavior of malicious software called Malware Instruction Set (MIST). The representation is optimized for effective and efficient a...
Philipp Trinius, Carsten Willems, Thorsten Holz, K...
SICHERHEIT
2010
15 years 5 days ago
CAPTCHAs: The Good, the Bad, and the Ugly
A CAPTCHA is a program that generates challenges that are easy to solve for humans but difficult to solve for computers. The most common CAPTCHAs today are text-based ones where a ...
Paul Baecher, Marc Fischlin, Lior Gordon, Robert L...