• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 130
Next 10 →

Autograph: Toward automated, distributed worm signature detection

by Hyang-ah Kim - In Proceedings of the 13th Usenix Security Symposium , 2004
"... Today’s Internet intrusion detection systems (IDSes) monitor edge networks ’ DMZs to identify and/or filter malicious flows. While an IDS helps protect the hosts on its local edge network from compromise and denial of service, it cannot alone effectively intervene to halt and reverse the spreading o ..."
Abstract - Cited by 362 (3 self) - Add to MetaCart
by analyzing the prevalence of portions of flow payloads, and thus uses no knowledge of protocol semantics above the TCP level. It is designed to produce signatures that exhibit high sensitivity (high true positives) and high specificity (low false positives); our evaluation of the system on real DMZ traces

Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution

by Zhiqiang Lin, Xuxian Jiang, Dongyan Xu, Xiangyu Zhang - IN 15TH SYMPOSIUM ON NETWORK AND DISTRIBUTED SYSTEM SECURITY (NDSS , 2008
"... Protocol reverse engineering has often been a manual process that is considered time-consuming, tedious and error-prone. To address this limitation, a number of solutions have recently been proposed to allow for automatic protocol reverse engineering. Unfortunately, they are either limited in extrac ..."
Abstract - Cited by 72 (9 self) - Add to MetaCart
Protocol reverse engineering has often been a manual process that is considered time-consuming, tedious and error-prone. To address this limitation, a number of solutions have recently been proposed to allow for automatic protocol reverse engineering. Unfortunately, they are either limited

Automatic Protocol Reverse-Engineering: Message Format Extraction and Field Semantics Inference

by Juan Caballero A, Dawn Song B
"... Understanding the command-and-control (C&C) protocol used by a botnet is crucial for anticipating its repertoire of nefarious activity. However, the C&C protocols of botnets, similar to many other application layer protocols, are undocumented. Automatic protocol reverse-engineering technique ..."
Abstract - Add to MetaCart
the availability of a program that implements the protocol. Our approach extracts more accurate and complete protocol information and enables the analysis of encrypted protocols. Our automatic protocol reverse-engineering techniques extract the message format and field semantics of protocol messages sent

D.: Polyglot: automatic extraction of protocol message format using dynamic binary analysis

by Juan Caballero, Heng Yin, Zhenkai Liang, Dawn Song - In: CCS ’07: Proceedings of the 14th ACM conference on Computer and communications security , 2007
"... Protocol reverse engineering, the process of extracting the application-level protocol used by an implementation, without access to the protocol specification, is important for many network security applications. Recent work [17] has proposed protocol reverse engineering by using clustering on netwo ..."
Abstract - Cited by 109 (21 self) - Add to MetaCart
Protocol reverse engineering, the process of extracting the application-level protocol used by an implementation, without access to the protocol specification, is important for many network security applications. Recent work [17] has proposed protocol reverse engineering by using clustering

Towards the Semantic Web – An Approach to Reverse Engineering of Relational Databases to Ontologies

by Irina Astrova - Advances in Databases and Information Systems: proceedings of the 9th East-European Conference, ADBIS 2005, Tallin, September 12-15, 2005. - ISBN 9985-59-545-9. - Tallin
"... Abstract. We propose a novel approach to reverse engineering of relational databases to ontologies. Our approach incorporates two main sources of semantics: HTML pages and a relational schema. This incorporation results in that: (1) only minimal information about a relational database is required to ..."
Abstract - Cited by 3 (0 self) - Add to MetaCart
Abstract. We propose a novel approach to reverse engineering of relational databases to ontologies. Our approach incorporates two main sources of semantics: HTML pages and a relational schema. This incorporation results in that: (1) only minimal information about a relational database is required

Towards an Explicit Intentional Semantics for Evolving Software

by Kim Mens , 1998
"... The subject of my PhD work is the study of software engineers' intentions and the importance of using the information provided by such intentions during the software engineering (SE) process. More specifically, we will study how explicit software intentions can contribute to a better understand ..."
Abstract - Cited by 1 (1 self) - Add to MetaCart
The subject of my PhD work is the study of software engineers' intentions and the importance of using the information provided by such intentions during the software engineering (SE) process. More specifically, we will study how explicit software intentions can contribute to a better

Software reverse engineering as a sensemaking task (in press).

by A R Bryant , R F Mills , G L Peterson , M R Grimaila , Adam R Bryant , Robert F Mills , Gilbert L Peterson , Michael R Grimaila - Journal of Information Assurance and Security. , 2012
"... Abstract: Software reverse engineering involves analyzing computer program executables to understand their structure, functionality, and behavior. In this paper, common reverse engineering functions are decomposed to isolate the information-processing and sensemaking subtasks involved. This paper r ..."
Abstract - Cited by 2 (2 self) - Add to MetaCart
not provide enough information (or are not trusted), reverse engineers can use third-party tools or write their own tools to support introspection. Reverse engineering tools can be roughly categorized as probe tools (or sensors) and control tools. Probe tools provide information about the program

Materials for an exploratory theory of the network society.

by Manuel Castells , Anthony Giddens , Alain Touraine , Anthony Smith , Benjamin Barber , Peter Hall , Roger-Pol Droit , Sophie Watson , Frank Webster , Krishan Kumar , David Lyon , Craig Calhoun , Jeffrey Henderson , Ramon Ramos , Jose E Rodrigues-Ibanez , Jose F Tezanos , Mary Kaldor , Stephen Jones , Christopher Freeman - The British Journal of Sociology , 2000
"... ABSTRACT This article aims at proposing some elements for a grounded theor y of the network society. The network society is the social structure characteristic of the Information Age, as tentatively identi ed by empirical, cross-cultural investigation. It permeates most societies in the world, in v ..."
Abstract - Cited by 122 (0 self) - Add to MetaCart
the construction of an analytical framework that could inform, and better organize, further research. However, given the dif culty of the task, and the necessarily collective character of this endeavour, what is presented here should be considered, literally, as materials to be used in the building of a

Ontology based Web Application Reverse-Engineering Approach

by Bouchiha Djelloul, Malki Mimoun, Benslimane Sidi Mohamed , 2006
"... Abstract. With the Web’s emergence and generalization in various domains such as economy, commerce, education, culture, etc, the Web application reverse-engineering process becomes necessary in order to facilitate the maintenance of such applications and the evolution towards new Web technology like ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
Abstract. With the Web’s emergence and generalization in various domains such as economy, commerce, education, culture, etc, the Web application reverse-engineering process becomes necessary in order to facilitate the maintenance of such applications and the evolution towards new Web technology

TOWARDS AN AUTOMATED HEALING OF 3D URBAN MODELS

by J. Bogdahn A, V. Coorsb
"... Three dimensional digital city models are more and more used in different domains. These models are acquired in different ways and in very different levels of detail, due to sensor limitations or simply because of requirements of the specific scenario. The tendency towards more sophisticated models ..."
Abstract - Add to MetaCart
including semantic information, additional attributes and links to larger datasets can be observed in recent years. The use of semantically rich standards (e.g. CityGML) for the modelling of urban space beyond the simple representation of the geometrical aspect is one of the key hints towards a rich ‘urban
Next 10 →
Results 1 - 10 of 130
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University