找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Research in Attacks, Intrusions, and Defenses; 19th International S Fabian Monrose,Marc Dacier,Joaquin Garcia-Alfaro Conference proceedings

[复制链接]
楼主: CANTO
发表于 2025-3-28 15:34:46 | 显示全部楼层
A Formal Framework for Environmentally Sensitive Malwaredel is that it cannot account for the most common approach to obfuscation used by malware: the observer effect. The observer effect describes the situation in which the act of observing something changes it. Malware implements the observer effect by detecting and acting on changes in its environment
发表于 2025-3-28 19:52:29 | 显示全部楼层
: A Tool for Massive Malware Labelingnce datasets in turn used for evaluating malware clustering and training malware classification approaches. Oftentimes, such labeling is based on labels output by antivirus engines. While AV labels are well-known to be inconsistent, there is often no other information available for labeling, thus se
发表于 2025-3-29 00:12:14 | 显示全部楼层
Semantics-Preserving Dissection of JavaScript Exploits via Dynamic JS-Binary Analysist statements that uniquely characterize the exploit and the payload location in the exploit. However, the current diagnosis techniques are inadequate because they approach the problem either from a JavaScript perspective and fail to account for “implicit” data flow invisible at JavaScript level, or
发表于 2025-3-29 05:46:31 | 显示全部楼层
The Messenger Shoots Back: Network Operator Based IMSI Catcher Detectionke phone calls, SMS or data transmission unbeknown to the user. They are readily available as commercial products as well as do-it-yourself projects running open-source software, and are obtained and used by law enforcement agencies and criminals alike. Multiple countermeasures have been proposed re
发表于 2025-3-29 10:44:47 | 显示全部楼层
发表于 2025-3-29 13:17:32 | 显示全部楼层
发表于 2025-3-29 18:42:37 | 显示全部楼层
发表于 2025-3-29 19:46:28 | 显示全部楼层
发表于 2025-3-30 02:56:34 | 显示全部楼层
发表于 2025-3-30 06:18:32 | 显示全部楼层
SandPrint: Fingerprinting Malware Sandboxes to Provide Intelligence for Sandbox Evasionngle sandbox. In fact, using supervised learning techniques, we show that adversaries can automatically generate a classifier that can reliably tell a sandbox and a real system apart. Finally, we show that we can use similar techniques to stealthily detect commercial malware security appliances of three popular vendors.
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-6-23 19:14
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表