Zobrazeno 1 - 10
of 13
pro vyhledávání: '"Craig Miles"'
Autor:
Robert A. Bridges, Sean Oesch, Michael D. Iannacone, Kelly M. T. Huffer, Brian Jewell, Jeff A. Nichols, Brian Weber, Miki E. Verma, Daniel Scofield, Craig Miles, Thomas Plummer, Mark Daniell, Anne M. Tall, Justin M. Beaver, Jared M. Smith
Publikováno v:
Digital Threats: Research and Practice.
There is a lack of scientific testing of commercially available malware detectors, especially those that boast accurate classification of never-before-seen (i.e., zero-day) files using machine learning (ML). Consequently, efficacy of malware detector
Publikováno v:
Digital Threats: Research and Practice. 1:1-21
Modern cyber attacks are often conducted by distributing digital documents that contain malware. The approach detailed herein, which consists of a classifier that uses features derived from dynamic analysis of a document viewer as it renders the docu
Autor:
Jared M. Smith, Dan Scofield, Craig Miles, Sean Oesch, Kelly M. T. Huffer, Justin M. Beaver, John R. Goodall, Robert A. Bridges
Publikováno v:
iThings/GreenCom/CPSCom/SmartData/Cybermatics
Gartner, a large research and advisory company, anticipates that by 2024 80% of security operation centers (SOCs) will use machine learning (ML) based solutions to enhance their operations.11https://www.ciodive.com/news/how-data-science-tools-can-lig
Publikováno v:
Proceedings of the 7th Software Security, Protection, and Reverse Engineering / Software Security and Protection Workshop.
Modern cyber attacks are often conducted by distributing digital documents that contain malware. The approach detailed herein, which consists of a classifier that uses features derived from dynamic analysis of a document viewer as it renders the docu
Publikováno v:
Journal of Computer Virology and Hacking Techniques. 9:109-123
VILO is a lazy learner system designed for malware classification and triage. It implements a nearest neighbor (NN) algorithm with similarities computed over Term Frequency $$\times $$ Inverse Document Frequency (TFIDF) weighted opcode mnemonic permu
Autor:
Miller, Craig Miles
Publikováno v:
Mississippi Review, 1990 Jan 01. 18(2/3), 96-96.
Externí odkaz:
https://www.jstor.org/stable/20134344
Publikováno v:
Journal in Computer Virology. 8:73-84
Programmers often identify functionality within a compiled program that they wish they could reuse in a manner other than that intended by the program's original authors. The traditional approach to reusing pre-existing functionality contained within
Publikováno v:
2014 7th International Symposium on Resilient Control Systems (ISRCS).
Autor:
Michael Howard, Avi Pfeffer, Arun Lakhotia, Charles LeDoux, Craig Miles, Lee Kellogg, Brian E. Ruttenberg, Vivek Notani
Publikováno v:
Detection of Intrusions and Malware, and Vulnerability Assessment ISBN: 9783319085081
DIMVA
DIMVA
Recent reports from the anti-malware industry indicate similarity between malware code resulting from code reuse can aid in developing a profile of the attackers. We describe a method for identifying shared components in a large corpus of malware, wh
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::dfd1f54a7c824cbba55bc352656c1b6b
https://doi.org/10.1007/978-3-319-08509-8_2
https://doi.org/10.1007/978-3-319-08509-8_2
Publikováno v:
ACM Southeast Regional Conference
Disassemblers generally assume that assembly language instructions do not overlap, therefore, an obvious obfuscation against such disassemblers is to overlap instructions. This is difficult to implement, however, as the number of instructions existin