×

Found 78 Documents (Results 1–78)

An Android malware detection method using better API contextual information. (English) Zbl 07883554

Ge, Chunpeng (ed.) et al., Information security and cryptology. 19th international conference, Inscrypt 2023, Hangzhou, China, December 9–10, 2023. Revised selected papers. Part II. Singapore: Springer. Lect. Notes Comput. Sci. 14527, 24-36 (2024).
MSC:  68Nxx 68Txx 94A60
Full Text: DOI

The Naked Sun: malicious cooperation between benign-looking processes. (English) Zbl 07314394

Conti, Mauro (ed.) et al., Applied cryptography and network security. 18th international conference, ACNS 2020, Rome, Italy, October 19–22, 2020. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12147, 254-274 (2020).
MSC:  68M25 94A60

Environmental authentication in malware. (English) Zbl 1454.94111

Lange, Tanja (ed.) et al., Progress in cryptology – LATINCRYPT 2017. 5th international conference on cryptology and information security in Latin America, Havana, Cuba, September 20–22, 2017. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 11368, 381-400 (2019).
MSC:  94A62
Full Text: DOI

NOR: towards non-intrusive, real-time and OS-agnostic introspection for virtual machines in cloud environment. (English) Zbl 1439.94066

Chen, Xiaofeng (ed.) et al., Information security and cryptology. 13th international conference, Inscrypt 2017, Xi’an, China, November 3–5, 2017. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 10726, 500-517 (2018).
MSC:  94A60
Full Text: DOI

A new malware classification approach based on malware dynamic analysis. (English) Zbl 1450.62074

Pieprzyk, Josef (ed.) et al., Information security and privacy. 22nd Australasian conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 10343, 173-189 (2017).
MSC:  62H30 62-08 68T05
Full Text: DOI

Application to cybersecurity of the stability theory of the systems of ordinary differential equations. (English) Zbl 1371.68075

Castrillón López, Marco (ed.) et al., Geometry, algebra and applications: from mechanics to cryptography. In honor of Jaime Muñoz Masqué on the occasion of his 65th birthday. Cham: Springer (ISBN 978-3-319-32084-7/hbk; 978-3-319-32085-4/ebook). Springer Proceedings in Mathematics & Statistics 161, 157-169 (2016).
MSC:  68P25 34D20
Full Text: DOI

Towards practical whitebox cryptography: optimizing efficiency and space hardness. (English) Zbl 1404.94041

Cheon, Jung Hee (ed.) et al., Advances in cryptology – ASIACRYPT 2016. 22nd international conference on the theory and application of cryptology and information security, Hanoi, Vietnam, December 4–8, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-53886-9/pbk; 978-3-662-53887-6/ebook). Lecture Notes in Computer Science 10031, 126-158 (2016).
MSC:  94A60
Full Text: DOI

A discrete dynamic model for computer worm propagation. (English) Zbl 1336.39006

Bohner, Martin (ed.) et al., Difference equations, discrete dynamical systems and applications. Proceedings of the 20th international conference on difference equations and applications, ICDEA, Wuhan, China, July 21–25, 2014. Cham: Springer (ISBN 978-3-319-24745-8/hbk; 978-3-319-24747-2/ebook). Springer Proceedings in Mathematics & Statistics 150, 119-131 (2015).
Full Text: DOI

How secure is AES under leakage. (English) Zbl 1382.94072

Iwata, Tetsu (ed.) et al., Advances in cryptology – ASIACRYPT 2015. 21st international conference on the theory and application of cryptology and information security, Auckland, New Zealand, November 29 – December 3, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-48799-0/pbk; 978-3-662-48800-3/ebook). Lecture Notes in Computer Science 9453, 361-385 (2015).
MSC:  94A60
Full Text: DOI

Boosting scalability in anomaly-based packed executable filtering. (English) Zbl 1292.94144

Wu, Chuan-Kun (ed.) et al., Information security and cryptology. 7th international conference, Inscrypt 2011, Beijing, China, November 30–December 3, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-34703-0/pbk). Lecture Notes in Computer Science 7537, 24-43 (2012).
MSC:  94A60
Full Text: DOI

Detection of polymorphic viruses in windows executables. (English) Zbl 1211.68116

Ranka, Sanjay (ed.) et al., Contemporary computing. Third international conference, IC3 2010, Noida, India, August 9–11, 2010. Proceedings, Part II. Berlin: Springer (ISBN 978-3-642-14824-8/pbk; 978-3-642-14825-5/ebook). Communications in Computer and Information Science 95, 120-130 (2010).
MSC:  68N99 68N25
Full Text: DOI

Modelling metamorphism by abstract interpretation. (English) Zbl 1306.68023

Cousot, Radhia (ed.) et al., Static analysis. 17th international symposium, SAS 2010, Perpignan, France, September 14–16, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-15768-4/pbk). Lecture Notes in Computer Science 6337, 218-235 (2010).
MSC:  68N30 68Q45 68Q55
Full Text: DOI

Service reliability and availability analysis of distributed software systems considering malware attack. (English) Zbl 1185.68210

Ślęzak, Dominik (ed.) et al., Advances in software engineering. International conference on advanced software engineering and its applications, ASEA 2009. Held as part of the future generation information technology conference, FGIT 2009, Jeju Island, Korea, December 10–12, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-10618-7/pbk; 978-3-642-10619-4/ebook). Communications in Computer and Information Science 59, 313-320 (2009).
MSC:  68N19
Full Text: DOI

Filter Results by …

Document Type

all top 5

Author

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software