Zobrazeno 1 - 7
of 7
pro vyhledávání: '"Mykolai Protsenko"'
Autor:
Noëlle Rakotondravony, Benjamin Taubmann, Waseem Mandarawi, Eva Weishäupl, Peng Xu, Bojan Kolosnjaji, Mykolai Protsenko, Hermann de Meer, Hans P. Reiser
Publikováno v:
Journal of Cloud Computing: Advances, Systems and Applications, Vol 6, Iss 1, Pp 1-12 (2017)
Abstract In the last few years, research has been motivated to provide a categorization and classification of security concerns accompanying the growing adaptation of Infrastructure as a Service (IaaS) clouds. Studies have been motivated by the risks
Externí odkaz:
https://doaj.org/article/714ec9288cb24c688925b493e0eabff1
Publikováno v:
Annual Computer Security Applications Conference.
Publikováno v:
ARES
Code similarity measures create a comparison metric showing to what degree two code samples have the same functionality, e.g., to statically detect the use of known libraries in binary code. They are both an indispensable part of automated malware an
Autor:
Julian Schütte, Manuel Huber, Sascha Wessel, Gerd Stefan Brost, Mykolai Protsenko, Michael Weiß
Publikováno v:
CPSS@AsiaCCS
The most recent and prominent advances in industrial computing include the growing interconnectivity of cyber-physical devices, as well as the increasing variety of complex applications exchanging data across company domains. In this context, the dat
Autor:
Mykolai Protsenko, Noëlle Rakotondravony, Waseem Mandarawi, Bojan Kolosnjaji, Benjamin Taubmann, Hermann de Meer, Hans P. Reiser, Peng Xu, Eva Weishäupl
Publikováno v:
Journal of Cloud Computing: Advances, Systems and Applications, Vol 6, Iss 1, Pp 1-12 (2017)
In the last few years, research has been motivated to provide a categorization and classification of security concerns accompanying the growing adaptation of Infrastructure as a Service (IaaS) clouds. Studies have been motivated by the risks, threats
Publikováno v:
ARES
Software piracy in general and repackaged apps with attached malware in particular pose serious threats for the Android ecosystem. In this paper, we present a cloud-compilation approach enabling sophisticated hardening of apps for non-rooted stock An
Publikováno v:
ARES
Smartphones are becoming more and more ubiquitous in the modern world, entrusted with such sensitive information as the user's location and banking data. Since Android is the most widespread smartphone platform, reliable and versatile means for Andro