找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Recent Advances in Intrusion Detection; 14th International S Robin Sommer,Davide Balzarotti,Gregor Maier Conference proceedings 2011 Spring

[复制链接]
楼主: Lipase
发表于 2025-3-25 04:57:51 | 显示全部楼层
Automated Identification of Cryptographic Primitives in Binary Programs an important problem. Proprietary programs and especially malicious software (so called .) often use cryptography and we want to learn more about the context, e.g., which algorithms and keys are used by the program. This helps an analyst to quickly understand what a given binary program does and ea
发表于 2025-3-25 08:48:20 | 显示全部楼层
Shellzer: A Tool for the Dynamic Analysis of Malicious Shellcodede is a challenging task, since encryption and evasion techniques are often used. This paper introduces ., a novel dynamic shellcode analyzer that generates a complete list of the API functions called by the shellcode, and, in addition, returns the binaries retrieved at run-time by the shellcode. Th
发表于 2025-3-25 14:11:37 | 显示全部楼层
KLIMAX: Profiling Memory Write Patterns to Detect Keystroke-Harvesting Malwarene of the most prominent activities to acquire private user information is to eavesdrop and harvest user-issued keystrokes. Despite the serious threat involved, keylogging activities are challenging to detect in the general case. From an operating system perspective, their general behavior is no dif
发表于 2025-3-25 19:09:58 | 显示全部楼层
发表于 2025-3-25 22:46:04 | 显示全部楼层
On the Expressiveness of Return-into-libc Attacksredirect control flow through existing (libc) functions within the legitimate program. While dangerous, it is generally considered limited in its expressive power since it only allows the attacker to execute straight-line code. In other words, RILC attacks are believed to be incapable of arbitrary c
发表于 2025-3-26 01:26:11 | 显示全部楼层
Cross-Domain Collaborative Anomaly Detection: So Far Yet So Closeonally identifiable information. Unfortunately, the need for ubiquitous and often anonymous access exposes web servers to adversaries. Indeed, network-borne zero-day attacks pose a critical and widespread threat to web servers that cannot be mitigated by the use of signature-based intrusion detectio
发表于 2025-3-26 05:19:07 | 显示全部楼层
发表于 2025-3-26 09:22:39 | 显示全部楼层
发表于 2025-3-26 15:58:59 | 显示全部楼层
发表于 2025-3-26 19:13:28 | 显示全部楼层
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-6-23 17:54
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表