Towards understanding malware behaviour by the extraction of API calls

M Alazab, S Venkataraman… - 2010 second cybercrime …, 2010 - ieeexplore.ieee.org
One of the recent trends adopted by malware authors is to use packers or software tools that
instigate code obfuscation in order to evade detection by antivirus scanners. With evasion …

Malicious web content detection by machine learning

YT Hou, Y Chang, T Chen, CS Laih… - expert systems with …, 2010 - Elsevier
The recent development of the dynamic HTML gives attackers a new and powerful
technique to compromise computer systems. A malicious dynamic HTML code is usually …

A framework for malware detection using combination technique and signature generation

MF Zolkipli, A Jantan - 2010 Second International Conference …, 2010 - ieeexplore.ieee.org
Malware detection must apply sophisticated technique to minimize malware thread that can
break computer operation. Nowadays malware writers try to avoid detection by using several …

Malicious executables classification based on behavioral factor analysis

H Zhao, M Xu, N Zheng, J Yao… - … Conference on e …, 2010 - ieeexplore.ieee.org
Malware is an increasingly important problem that threatens the security of computer
systems. The new concept of cloud security require rapid and automated detection and …

Stronger enforcement of security using aop and spring aop

K Sirbi, PJ Kulkarni - arXiv preprint arXiv:1006.4550, 2010 - arxiv.org
An application security has two primary goals: first, it is intended to prevent unauthorised
personnel from accessing information at higher classification than their authorisation …

Security evaluation and hardening of free and open source software (FOSS)

R Charpentier, M Debbabi, D Alhadidi… - … Communications of the …, 2010 - eceasst.org
Abstract Recently, Free and Open Source Software (FOSS) has emerged as an alternative to
Commercial-Off-The-Shelf (COTS) software. Now, FOSS is perceived as a viable long-term …

[PDF][PDF] Fourth International Workshop on Foundations and Techniques for Open Source Software Certification (OpenCert 2010)

OSV under a Cloud - Electronic Communications of the EASST, 2010 - researchgate.net
An experiment in providing volunteer cloud computing support for automated audits of open
source code is described here, along with the supporting theory. Certification and the …

Integrating botnet simulations with network centric warfare simulations

MR Stytz, SB Banks - … for Defense Systems and Applications V, 2010 - spiedigitallibrary.org
" Botnets," or" bot armies," are large groups of remotely controlled malicious software
designed and operated in order to conduct attacks against government and civilian targets …

Using simulation and virtual machines to identify information assurance requirements

SB Banks, MR Stytz - … for Defense Systems and Applications V, 2010 - spiedigitallibrary.org
The US military is changing its philosophy, approach, and technologies used for warfare. In
the process of achieving this vision for high-speed, highly mobile warfare, there are a …

Vérification de code pour systèmes Embarqués

N Messolhi - 2010 - dspace.univ-guelma.dz
La vérification prend une place croissante dans l‟ informatique moderne. En grande partie
parce que nous nous reposons de plus en plus sur les systèmes informatiques. Que cela …