… , a novel system to detect serverside malware that routinely … side Malware: This research focuses on identifying malicious … isolated execution on a predicate or on terminal events (ie, exit …
… We propose a new architecture for secure applications, Cloud Terminal, in which the only … VMs lets one server support hundreds of users. We implement a secure thin terminal that runs …
IZ Berta, I VAJDA - PhD dissertaion, 2005 - berta.hu
… If we assume that the terminal is not malicious, the protocol is secure. However, if the terminal is malicious (either because it is infected by a virus or because it is under the control of an …
… At the same time, detecting maliciousterminalservers is hindered by their diversities and various cloaking techniques. However, observations from our measurement study convey a …
… web browsers to attackers' websites and maliciously spoof user-input to … terminals (eg Internet cafes). Worryingly, however, the recent wave of crimeware attacks has involved malicious …
… behaviors: (1) the serverside allows some wrong or malicious data to enter the system, leading … of an automaton are represented as a Multi-terminal Binary Decision Diagram (MBDD). …
… using the BNF forms with non-terminal terms and terminal terms (tokens). Some examples … UA-based attacks to a targeted server. If running on the serverside, our system can only allow …
… We evaluated the security of OTP-2FA in the malicious program’s presence in the user terminal and tried to assess if it adds any additional protection in that circumstance. We designed …
P Jeitner, H Shulman - 30th USENIX Security Symposium (USENIX …, 2021 - usenix.org
… to an authentication server are not validated. We show how to construct malicious payloads to … By including ANSI terminal escape codes in the CNAME record, an attacker controlling the …