Results 1 - 10
of
48
Detecting malicious inclusions in secure hardware: Challenges and solutions
- In HOST
, 2008
"... This paper addresses a new threat to the security of integrated circuits (ICs) used in safety critical, security and military systems. The migration of IC fabrication to low-cost foundries has made ICs vulnerable to malicious alterations, that could, under specific conditions, result in functional c ..."
Abstract
-
Cited by 33 (4 self)
- Add to MetaCart
This paper addresses a new threat to the security of integrated circuits (ICs) used in safety critical, security and military systems. The migration of IC fabrication to low-cost foundries has made ICs vulnerable to malicious alterations, that could, under specific conditions, result in functional
Smartphone Dual Defense Protection Framework: Detecting Malicious Applications in Android Markets
"... Abstract — In this paper, we present a smartphone dual defense protection framework that allows Official and Alternative Android Markets to detect malicious applications among those new applications that are submitted for public release. Our framework consists of servers running on clouds where deve ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
Abstract — In this paper, we present a smartphone dual defense protection framework that allows Official and Alternative Android Markets to detect malicious applications among those new applications that are submitted for public release. Our framework consists of servers running on clouds where
Process Algebra Based Formal Method for SDN Application Verification
, 2014
"... Recently, there have been continuous efforts and progresses regarding the research on diverse network control and management platforms for SDN (Software Defined Networking). SDN is defined as a new technology to enable service providers/network operators easily to control and manage their networks b ..."
Abstract
- Add to MetaCart
new framework for SDN application verification and a prototype based on the formal method, especially with process algebra called pACSR which is
DATA MINING FOR MALICIOUS CODE DETECTION AND SECURITY SYSTEM APPLICATION
"... Abstract — Over the past few years, a new computer security problem has arisen, malwares and spywares. Anti-Virus techniques cannot deal with such applications or code, due to their silent infection techniques and their differences from a regular virus. Various Anti-Spyware programs have been implem ..."
Abstract
- Add to MetaCart
implemented as a counter-measure but most of these programs work using the signature method, which is weak against new spyware. We has presented a data-mining framework that detects new, previously unseen malicious executables by checking their source code. This paper takes our work as a candidate and applies
A Framework for Tamper Detection Marking of Mobile Applications
- In Proceedings of the Fourteenth International Symposium on Software Reliability Engineering (ISSRE). IEEE
, 2003
"... Today’s applications are highly mobile; we download software from the Internet, machine executable code arrives attached to electronic mail, and Java applets increase the functionality and appearance of web pages. This movement has stirred a great deal of research in the area of mobile code security ..."
Abstract
-
Cited by 6 (2 self)
- Add to MetaCart
security. The fact remains that a newly arrived program to a local host has the potential to inflict significant damage to the local host and local resources. Perhaps the new program originated from a charlatan host masquerading as a trusted server, or has been modified by a malicious party during transit
On Malware Leveraging the Android Accessibility Framework
"... Abstract. The number of Android malware has been increasing dra-matically in recent years. Android malware can violate users ’ security, privacy and damage their economic situation. Study of new malware will allow us to better understand the threat and design effective anti-malware strategies. In th ..."
Abstract
- Add to MetaCart
. In this paper, we introduce a new type of malware exploiting Android’s accessibility framework and describe a condition which allows malicious payloads to usurp control of the screen, steal user credentials and compromise user privacy and security. We implement a proof of concept malware to demonstrate
On Malware Leveraging the Android Accessibility Framework
"... Abstract. The number of Android malware has been increasing dra-matically in recent years. Android malware can violate users ’ security, privacy and damage their economic situation. Study of new malware will allow us to better understand the threat and design effective anti-malware strategies. In th ..."
Abstract
- Add to MetaCart
. In this paper, we introduce a new type of malware exploiting Android’s accessibility framework and describe a condition which allows malicious payloads to usurp control of the screen, steal user credentials and compromise user privacy and security. We implement a proof of concept malware to demonstrate
Secure Mobile Code Computing Framework
- PWASET VOLUME 5 APRIL 2005 ISSN 1307-6884 118 © 2005 WASET.ORG OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY VOLUME 5 APRIL 2005 ISSN
"... Abstract:- Mobile code systems are technologies that allow applications to move their codes, and possibly the corresponding state, among the nodes of a wide area network. The code mobility is a flexible and powerful mechanism that can be exploited to build distributed applications in an internet sca ..."
Abstract
-
Cited by 2 (1 self)
- Add to MetaCart
scale. However, these new technological capabilities come with inherent security hazards, both for the platforms that host the mobile code, and to the mobile code itself. In the current research we present a framework that affords the ability to the mobile code to carry the desired computation in a
USim: A User Behavior Simulation Framework for Training and Testing IDSes
- in GUI based Systems, Proceedings of the 39th Annual Simulation Symposium (ANSS
, 2006
"... Anomaly detection systems largely depend on user profile data to be able to detect deviation from normal activity. Most of this profile data is based on commands executed by users on a system and may not represent user’s complete behavior which is essential for effectively detecting the anomalies in ..."
Abstract
-
Cited by 7 (1 self)
- Add to MetaCart
in the system. Collection of user behavior data is a slow and time consuming process. In this paper, we propose a new approach to automate the generation of user data by parameterizing user behavior in terms of user intention (malicious/normal), user skill level, set of applications installed on a machine
AppIntent: Analyzing Sensitive Data Transmission in Android for Privacy Leakage Detection
"... Android phones often carry personal information, attracting malicious developers to embed code in Android applications to steal sensitive data. With known techniques in the literature, one may easily determine if sensitive data is being transmitted out of an Android phone. However, transmission of s ..."
Abstract
-
Cited by 29 (2 self)
- Add to MetaCart
first solution in this space, we present a new analysis framework called AppIntent. For each data transmission, AppIntent can efficiently provide a sequence of GUI manipulations corresponding to the sequence of events that lead to the data transmission, thus helping an analyst to determine if the data
Results 1 - 10
of
48