离开可分裂 发表于 2025-3-23 11:51:35

Phoenix: DGA-Based Botnet Tracking and Intelligenceism, recent work has focused on the analysis of DNS traffic to recognize botnets based on their DGAs. While previous work has concentrated on detection, we focus on supporting intelligence operations. We propose ., a mechanism that, in addition to telling DGA- and non-DGA-generated domains apart usi

歹徒 发表于 2025-3-23 16:12:59

Quantifiable Run-Time Kernel Attack Surface Reduction much as 90% of kernel functions are not required for processing system calls originating from a typical network daemon. This results in an unnecessarily high exposure. In this paper, we introduce kRazor, an approach to reduce the kernel’s attack surface by limiting the amount of kernel code accessi

特征 发表于 2025-3-23 19:06:14

http://reply.papertrans.cn/27/2693/269226/269226_13.png

GROG 发表于 2025-3-24 01:08:14

http://reply.papertrans.cn/27/2693/269226/269226_14.png

vasculitis 发表于 2025-3-24 04:03:56

Introducing Gender Budgeting in Europe experiment conducted independently by MITLL. Our technique provides an automated method to find between malware code functional relationships that may be used to establish evolutionary relationships and aid in forensics.

GUILT 发表于 2025-3-24 07:03:01

Angela O’Hagan,Elisabeth Klatzern code by crafting trigger-dependent bugs, which jump to the hidden code only if provided with the correct trigger. Thus, the hidden code also remains invisible under dynamic analysis if the correct trigger is unknown. We demonstrate the feasibility of our approach by crafting a hidden backdoor for the Nginx HTTP server module.

睨视 发表于 2025-3-24 12:12:51

http://reply.papertrans.cn/27/2693/269226/269226_17.png

Fester 发表于 2025-3-24 14:57:46

http://reply.papertrans.cn/27/2693/269226/269226_18.png

Autobiography 发表于 2025-3-24 22:28:48

http://reply.papertrans.cn/27/2693/269226/269226_19.png

Expostulate 发表于 2025-3-25 01:21:59

http://reply.papertrans.cn/27/2693/269226/269226_20.png
页: 1 [2] 3 4 5 6
查看完整版本: Titlebook: Detection of Intrusions and Malware, and Vulnerability Assessment; 11th International C Sven Dietrich Conference proceedings 2014 Springer