[图书][B] IT-Sicherheit: Konzepte–Verfahren–Protokolle
C Eckert - 2013 - degruyter.com
Literaturverzeichnis Page 1 Literaturverzeichnis [1] 3GPP. Design of the UMTS Cipher and
Integrity Functions. [2] 3GPP. UMTS Security Architecture. [3] Martın Abadi and Roger M …
Integrity Functions. [2] 3GPP. UMTS Security Architecture. [3] Martın Abadi and Roger M …
Exploring the design space of page management for {Multi-Tiered} memory systems
With the arrival of tiered memory systems comprising various types of memory, such as
DRAM and SCM, the operating system support for memory management is becoming …
DRAM and SCM, the operating system support for memory management is becoming …
Federated TON_IoT Windows datasets for evaluating AI-based security applications
N Moustafa, M Keshky, E Debiez… - 2020 IEEE 19th …, 2020 - ieeexplore.ieee.org
Existing cyber security solutions have been basically developed using knowledge-based
models that often cannot trigger new cyber-attack families. With the boom of Artificial …
models that often cannot trigger new cyber-attack families. With the boom of Artificial …
Rapid prototyping for microarchitectural attacks
In recent years, microarchitectural attacks have been demonstrated to be a powerful attack
class. However, as our empirical analysis shows, there are numerous implementation …
class. However, as our empirical analysis shows, there are numerous implementation …
[HTML][HTML] Optimization of code caves in malware binaries to evade machine learning detectors
Abstract Machine Learning (ML) techniques, especially Artificial Neural Networks, have
been widely adopted as a tool for malware detection due to their high accuracy when …
been widely adopted as a tool for malware detection due to their high accuracy when …
Iron: Isolating network-based {CPU} in container environments
Containers are quickly increasing in popularity as the mechanism to deploy computation in
the cloud. In order to provide consistent and reliable performance, cloud providers must …
the cloud. In order to provide consistent and reliable performance, cloud providers must …
You are your friends: Detecting malware via guilt-by-association and exempt-by-reputation
With the increase in the prevalence of Security Information and Event Management Systems
(SIEMs) in today's organizations, there is a growing interest in data-driven threat detection …
(SIEMs) in today's organizations, there is a growing interest in data-driven threat detection …
Resurrecting anti-virtualization and anti-debugging: Unhooking your hooks
T Apostolopoulos, V Katos, KKR Choo… - Future Generation …, 2021 - Elsevier
Dynamic malware analysis involves the debugging of the associated binary files and the
monitoring of changes in sandboxed environments. This allows the investigator to …
monitoring of changes in sandboxed environments. This allows the investigator to …
[HTML][HTML] Windows memory forensics: Detecting (un) intentionally hidden injected code by examining page table entries
F Block, A Dewald - Digital Investigation, 2019 - Elsevier
Malware utilizes code injection techniques to either manipulate other processes (eg done by
banking trojans) or hide its existence. With some exceptions, such as ROP gadgets, the …
banking trojans) or hide its existence. With some exceptions, such as ROP gadgets, the …
Defense and attack techniques against file-based TOCTOU vulnerabilities: A systematic review
File-based Time-of-Check to Time-of-Use (TOCTOU) race conditions are a well-known type
of security vulnerability. A wide variety of techniques have been proposed to detect, mitigate …
of security vulnerability. A wide variety of techniques have been proposed to detect, mitigate …