Zobrazeno 1 - 6
of 6
pro vyhledávání: '"Jeremy D. Seideman"'
Autor:
Kyeongseok Yang, Shoufu Luo, Hajin Jang, Geonwoo Lee, Jeremy D. Seideman, Heejo Lee, Sven Dietrich, Yoonjong Na
Publikováno v:
ICT Systems Security and Privacy Protection ISBN: 9783030781194
SEC
SEC
Due to code reuse among software packages, vulnerabilities can propagate from one software package to another. Current code clone detection techniques are useful for preventing and managing such vulnerability propagation. When the source code for a s
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::1dbe386086ae185e43026e9846dd3aa5
https://doi.org/10.1007/978-3-030-78120-0_5
https://doi.org/10.1007/978-3-030-78120-0_5
Publikováno v:
IEEE Symposium on Security and Privacy Workshops
Encryption has become increasingly prevalent in many applications and for various purposes, but its use also brings big challenges to network security. In this paper, we take the first steps towards addressing some of these challenges by introducing
Publikováno v:
Journal of Information Security. :101-110
Dynamic analysis of malware allows us to examine malware samples, and then group those samples into families based on observed behavior. Using Boolean variables to represent the presence or absence of a range of malware behavior, we create a bitstrin
Publikováno v:
Communications in Computer and Information Science ISBN: 9783319192093
FNSS
FNSS
Malware is constantly changing and is released very rapidly, necessarily to remain effective in the changing computer landscape. Some malware files can be related to each other; studies that indicate that malware samples are similar often base that d
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::d3bbc637dbdba5fdc17da68c9e9d8789
https://doi.org/10.1007/978-3-319-19210-9_10
https://doi.org/10.1007/978-3-319-19210-9_10
Publikováno v:
MALWARE
The study of malware often involves some form of grouping or clustering in order to indicate malware samples that are closely related. There are many ways that this can be performed, depending on the type of data that is recorded to represent the mal
Publikováno v:
IWCMC
One of the ways that malware infects is by exploiting weaknesses in computer systems, often through conditions in software. When this happens, software and operating system vendors must repair these vulnerabilities by patching their software. However