Results 1 - 10
of
130
Autograph: Toward automated, distributed worm signature detection
- In Proceedings of the 13th Usenix Security Symposium
, 2004
"... Today’s Internet intrusion detection systems (IDSes) monitor edge networks ’ DMZs to identify and/or filter malicious flows. While an IDS helps protect the hosts on its local edge network from compromise and denial of service, it cannot alone effectively intervene to halt and reverse the spreading o ..."
Abstract
-
Cited by 362 (3 self)
- Add to MetaCart
by analyzing the prevalence of portions of flow payloads, and thus uses no knowledge of protocol semantics above the TCP level. It is designed to produce signatures that exhibit high sensitivity (high true positives) and high specificity (low false positives); our evaluation of the system on real DMZ traces
Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution
- IN 15TH SYMPOSIUM ON NETWORK AND DISTRIBUTED SYSTEM SECURITY (NDSS
, 2008
"... Protocol reverse engineering has often been a manual process that is considered time-consuming, tedious and error-prone. To address this limitation, a number of solutions have recently been proposed to allow for automatic protocol reverse engineering. Unfortunately, they are either limited in extrac ..."
Abstract
-
Cited by 72 (9 self)
- Add to MetaCart
Protocol reverse engineering has often been a manual process that is considered time-consuming, tedious and error-prone. To address this limitation, a number of solutions have recently been proposed to allow for automatic protocol reverse engineering. Unfortunately, they are either limited
Automatic Protocol Reverse-Engineering: Message Format Extraction and Field Semantics Inference
"... Understanding the command-and-control (C&C) protocol used by a botnet is crucial for anticipating its repertoire of nefarious activity. However, the C&C protocols of botnets, similar to many other application layer protocols, are undocumented. Automatic protocol reverse-engineering technique ..."
Abstract
- Add to MetaCart
the availability of a program that implements the protocol. Our approach extracts more accurate and complete protocol information and enables the analysis of encrypted protocols. Our automatic protocol reverse-engineering techniques extract the message format and field semantics of protocol messages sent
D.: Polyglot: automatic extraction of protocol message format using dynamic binary analysis
- In: CCS ’07: Proceedings of the 14th ACM conference on Computer and communications security
, 2007
"... Protocol reverse engineering, the process of extracting the application-level protocol used by an implementation, without access to the protocol specification, is important for many network security applications. Recent work [17] has proposed protocol reverse engineering by using clustering on netwo ..."
Abstract
-
Cited by 109 (21 self)
- Add to MetaCart
Protocol reverse engineering, the process of extracting the application-level protocol used by an implementation, without access to the protocol specification, is important for many network security applications. Recent work [17] has proposed protocol reverse engineering by using clustering
Towards the Semantic Web – An Approach to Reverse Engineering of Relational Databases to Ontologies
- Advances in Databases and Information Systems: proceedings of the 9th East-European Conference, ADBIS 2005, Tallin, September 12-15, 2005. - ISBN 9985-59-545-9. - Tallin
"... Abstract. We propose a novel approach to reverse engineering of relational databases to ontologies. Our approach incorporates two main sources of semantics: HTML pages and a relational schema. This incorporation results in that: (1) only minimal information about a relational database is required to ..."
Abstract
-
Cited by 3 (0 self)
- Add to MetaCart
Abstract. We propose a novel approach to reverse engineering of relational databases to ontologies. Our approach incorporates two main sources of semantics: HTML pages and a relational schema. This incorporation results in that: (1) only minimal information about a relational database is required
Towards an Explicit Intentional Semantics for Evolving Software
, 1998
"... The subject of my PhD work is the study of software engineers' intentions and the importance of using the information provided by such intentions during the software engineering (SE) process. More specifically, we will study how explicit software intentions can contribute to a better understand ..."
Abstract
-
Cited by 1 (1 self)
- Add to MetaCart
The subject of my PhD work is the study of software engineers' intentions and the importance of using the information provided by such intentions during the software engineering (SE) process. More specifically, we will study how explicit software intentions can contribute to a better
Software reverse engineering as a sensemaking task (in press).
- Journal of Information Assurance and Security.
, 2012
"... Abstract: Software reverse engineering involves analyzing computer program executables to understand their structure, functionality, and behavior. In this paper, common reverse engineering functions are decomposed to isolate the information-processing and sensemaking subtasks involved. This paper r ..."
Abstract
-
Cited by 2 (2 self)
- Add to MetaCart
not provide enough information (or are not trusted), reverse engineers can use third-party tools or write their own tools to support introspection. Reverse engineering tools can be roughly categorized as probe tools (or sensors) and control tools. Probe tools provide information about the program
Materials for an exploratory theory of the network society.
- The British Journal of Sociology
, 2000
"... ABSTRACT This article aims at proposing some elements for a grounded theor y of the network society. The network society is the social structure characteristic of the Information Age, as tentatively identi ed by empirical, cross-cultural investigation. It permeates most societies in the world, in v ..."
Abstract
-
Cited by 122 (0 self)
- Add to MetaCart
the construction of an analytical framework that could inform, and better organize, further research. However, given the dif culty of the task, and the necessarily collective character of this endeavour, what is presented here should be considered, literally, as materials to be used in the building of a
Ontology based Web Application Reverse-Engineering Approach
, 2006
"... Abstract. With the Web’s emergence and generalization in various domains such as economy, commerce, education, culture, etc, the Web application reverse-engineering process becomes necessary in order to facilitate the maintenance of such applications and the evolution towards new Web technology like ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
Abstract. With the Web’s emergence and generalization in various domains such as economy, commerce, education, culture, etc, the Web application reverse-engineering process becomes necessary in order to facilitate the maintenance of such applications and the evolution towards new Web technology
TOWARDS AN AUTOMATED HEALING OF 3D URBAN MODELS
"... Three dimensional digital city models are more and more used in different domains. These models are acquired in different ways and in very different levels of detail, due to sensor limitations or simply because of requirements of the specific scenario. The tendency towards more sophisticated models ..."
Abstract
- Add to MetaCart
including semantic information, additional attributes and links to larger datasets can be observed in recent years. The use of semantically rich standards (e.g. CityGML) for the modelling of urban space beyond the simple representation of the geometrical aspect is one of the key hints towards a rich ‘urban
Results 1 - 10
of
130