Malicious

Results: 683



#Item
21arXiv:1404.3465v1 [cs.CR] 14 AprNetwork-on-Chip Firewall: Countering Defective and Malicious System-on-Chip Hardware Michael LeMay∗, Carl A. Gunter University of Illinois at Urbana-Champaign

arXiv:1404.3465v1 [cs.CR] 14 AprNetwork-on-Chip Firewall: Countering Defective and Malicious System-on-Chip Hardware Michael LeMay∗, Carl A. Gunter University of Illinois at Urbana-Champaign

Add to Reading List

Source URL: sharps.org

Language: English - Date: 2014-06-20 15:53:16
    22Malicious Threat Detection  3 reasons why you want to integrate breach detection into a SIEM solution  Many companies rely on a Security Information and Event Management (SIEM)

    Malicious Threat Detection 3 reasons why you want to integrate breach detection into a SIEM solution Many companies rely on a Security Information and Event Management (SIEM)

    Add to Reading List

    Source URL: www.redsocks.eu

    Language: English - Date: 2018-08-06 04:35:01
      23.  faster malicious 2pc with online/offline dual execution Mike Rosulek @

      . faster malicious 2pc with online/offline dual execution Mike Rosulek @

      Add to Reading List

      Source URL: web.engr.oregonstate.edu

      - Date: 2016-07-26 12:27:06
        24Optical Delusions: A Study of Malicious QR Codes in the Wild Amin Kharraz∗ , Engin Kirda∗ , William Robertson∗ , Davide Balzarotti† , Aurélien Francillon† ∗ Northeastern  University, Boston, USA

        Optical Delusions: A Study of Malicious QR Codes in the Wild Amin Kharraz∗ , Engin Kirda∗ , William Robertson∗ , Davide Balzarotti† , Aurélien Francillon† ∗ Northeastern University, Boston, USA

        Add to Reading List

        Source URL: s3.eurecom.fr

        Language: English - Date: 2018-08-15 14:28:52
          25Execute This! Analyzing Unsafe and Malicious Dynamic Code Loading in Android Applications Sebastian Poeplau∗† , Yanick Fratantonio∗ , Antonio Bianchi∗ , Christopher Kruegel∗ , Giovanni Vigna∗ ∗ UC

          Execute This! Analyzing Unsafe and Malicious Dynamic Code Loading in Android Applications Sebastian Poeplau∗† , Yanick Fratantonio∗ , Antonio Bianchi∗ , Christopher Kruegel∗ , Giovanni Vigna∗ ∗ UC

          Add to Reading List

          Source URL: www.s3.eurecom.fr

          Language: English - Date: 2017-11-07 11:46:31
            26Survivability of Large Networks in the Presence of Malicious Attacks Casey T. Deccio, Spencer Cox, Matthew Smith, Jacob Wan, Mark Clement, and Quinn Snell Computer Science Department Brigham Young University

            Survivability of Large Networks in the Presence of Malicious Attacks Casey T. Deccio, Spencer Cox, Matthew Smith, Jacob Wan, Mark Clement, and Quinn Snell Computer Science Department Brigham Young University

            Add to Reading List

            Source URL: m.smithworx.com

            Language: English - Date: 2010-07-01 18:07:10
              27Illustrating the Risk of Unconstrained Strings One way to reduce the likelihood that a string can contain unauthorized or malicious content is to constrain the contents of the string. As the following figure shows, there

              Illustrating the Risk of Unconstrained Strings One way to reduce the likelihood that a string can contain unauthorized or malicious content is to constrain the contents of the string. As the following figure shows, there

              Add to Reading List

              Source URL: www.xfront.com

              - Date: 2017-03-08 13:42:08
                28Unconditional UC-Secure Computation with (Stronger-Malicious) PUFs Saikrishna Badrinarayanan∗ Dakshita Khurana†

                Unconditional UC-Secure Computation with (Stronger-Malicious) PUFs Saikrishna Badrinarayanan∗ Dakshita Khurana†

                Add to Reading List

                Source URL: web.cs.ucla.edu

                Language: English - Date: 2017-11-29 01:25:51
                  29Prophiler: A Fast Filter for the Large-Scale Detection of Malicious Web Pages Davide Canali Institute Eurecom, France

                  Prophiler: A Fast Filter for the Large-Scale Detection of Malicious Web Pages Davide Canali Institute Eurecom, France

                  Add to Reading List

                  Source URL: davidecanali.com

                  Language: English - Date: 2013-09-25 18:20:21
                    30User-Centric Dependence Analysis For Identifying Malicious Mobile Apps Karim O. Elish, Danfeng (Daphne) Yao, and Barbara G. Ryder Department of Computer Science Virginia Tech Blacksburg, VA, USA

                    User-Centric Dependence Analysis For Identifying Malicious Mobile Apps Karim O. Elish, Danfeng (Daphne) Yao, and Barbara G. Ryder Department of Computer Science Virginia Tech Blacksburg, VA, USA

                    Add to Reading List

                    Source URL: people.cs.vt.edu

                    Language: English - Date: 2012-04-20 15:19:52