[PDF][PDF] {BotGrep}: Finding {P2P} Bots with Structured Graph Analysis

S Nagaraja, P Mittal, CY Hong, M Caesar… - 19th USENIX Security …, 2010 - usenix.org
A key feature that distinguishes modern botnets from earlier counterparts is their increasing
use of structured overlay topologies. This lets them carry out sophisticated coordinated …

Bootstrapping trust in commodity computers

B Parno, JM McCune, A Perrig - 2010 IEEE Symposium on …, 2010 - ieeexplore.ieee.org
Trusting a computer for a security-sensitive task (such as checking email or banking online)
requires the user to know something about the computer's state. We examine research on …

Building verifiable trusted path on commodity x86 computers

Z Zhou, VD Gligor, J Newsome… - 2012 IEEE symposium …, 2012 - ieeexplore.ieee.org
A trusted path is a protected channel that assures the secrecy and authenticity of data
transfers between a user's input/output (I/O) device and a program trusted by that user. We …

Toward trustworthy mobile sensing

P Gilbert, LP Cox, J Jung, D Wetherall - Proceedings of the Eleventh …, 2010 - dl.acm.org
Commodity mobile devices have been utilized as sensor nodes in a variety of domains,
including citizen journalism, mobile social services, and domestic eldercare. In each of these …

I am a sensor, and i approve this message

S Saroiu, A Wolman - Proceedings of the Eleventh Workshop on Mobile …, 2010 - dl.acm.org
Despite the popularity of adding sensors to mobile devices, the readings provided by these
sensors cannot be trusted. Users can fabricate sensor readings with relatively little effort …

Novel digital forensic readiness technique in the cloud environment

VR Kebande, HS Venter - Australian Journal of Forensic Sciences, 2018 - Taylor & Francis
This paper examines the design and implementation of a feasible technique for performing
Digital Forensic Readiness (DFR) in cloud computing environments. The approach employs …

[图书][B] Bootstrapping trust in modern computers

B Parno, JM McCune, A Perrig - 2011 - books.google.com
Trusting a computer for a security-sensitive task (such as checking email or banking online)
requires the user to know something about the computer's state. We examine research on …

Logical attestation: An authorization architecture for trustworthy computing

EG Sirer, W de Bruijn, P Reynolds, A Shieh… - Proceedings of the …, 2011 - dl.acm.org
This paper describes the design and implementation of a new operating system
authorization architecture to support trustworthy computing. Called logical attestation, this …

What's clicking what? techniques and innovations of today's clickbots

B Miller, P Pearce, C Grier, C Kreibich… - Detection of Intrusions and …, 2011 - Springer
With the widespread adoption of Internet advertising, fraud has become a systemic problem.
While the existence of clickbots—malware specialized for conducting click-fraud—has been …

Detection of stealthy malware activities with traffic causality and scalable triggering relation discovery

H Zhang, DD Yao, N Ramakrishnan - … of the 9th ACM symposium on …, 2014 - dl.acm.org
Studies show that a significant portion of networked computers are infected with stealthy
malware. Infection allows remote attackers to control, utilize, or spy on victim machines …