Understand your shady neighborhood: An approach for detecting and investigating hacker communities

D Manatova, C DeVries, S Samtani - Decision Support Systems, 2024 - Elsevier
Cyber threat intelligence (CTI) researchers strive to uncover collaborations and emerging
techniques within hacker networks. This study proposes an empirical approach to detect …

Hypervisor-based protection of code

M Kiperberg, R Leon, A Resh, A Algawi… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
The code of a compiled program is susceptible to reverse-engineering attacks on the
algorithms and the business logic that are contained within the code. The main existing …

Optimal lot-sizing with capacity constraints and auto-correlated interarrival times

ST Enns, L Li - Proceedings of the 2004 Winter Simulation …, 2004 - ieeexplore.ieee.org
There have been recent advances in using queuing relationships to determine lot sizes that
minimize mean flowtimes when multiple product types are being produced at capacity …

Introduction to SinJAR (a New Tool for Reverse Engineering Java Applications) and Tracing Its Malicious Actions Using Hidden Markov Models

J Fattahi, M Mejri, M Ziadia, E Pricop… - New Trends in …, 2017 - ebooks.iospress.nl
In this paper, we are proposing a new tool for reversing Java applications called SinJAR.
SinJAR is a lightweight software written in Java aiming at inspecting bytecode at compile …

[PDF][PDF] ng Java Action

U CAN - researchgate.net
In this paper, we are proposing a new tool for reversing Java applications called SinJAR.
SinJAR is a lightweight software written in Java aiming at inspecting bytecode at compile …

GoldRusher: A miner for rapid identification of hidden code

A Salem - 2018 IEEE 25th International Conference on …, 2018 - ieeexplore.ieee.org
GoldRusher is a dynamic analysis tool primarily meant to aid reverse engineers with
analyzing malware. Based on the fact that hidden code segments rarely execute, the tool is …