Poster

Results: 19881



#Item
11Software / Computing / Antivirus software / Security breaches / Proprietary software / Malware / Kaspersky Lab / Google Chrome / Internet Explorer

Poster: Detecting WebInjects through Live Memory Inspection Nicola Mariani∗ , Andrea Continella∗ , Marcello Pogliani∗ , Michele Carminati∗ , Federico Maggi∗† , and Stefano Zanero∗ ∗ Dipartimento

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-02 20:58:16
12Computing / Cyberwarfare / Computer security / Cryptography / Cybercrime / Computer network security / Backdoor / Rootkits / Google Play / Android / Firebase / Password

Poster: Design of Backdoor on Android Devices Junsung Cho, Geumhwan Cho, Sangwon Hyun and Hyoungshick Kim Department of Computer Science and Engineering, Sungkyunkwan University, Republic of Korea Email: {js.cho, geumhwa

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-13 08:11:56
13Computer architecture / Computing / System software / Software bugs / Embedded operating systems / Electrical engineering / Stack buffer overflow / FreeRTOS / Protection ring / Buffer overflow protection / Internet of things / Memory protection

Poster: EPOXY—Enabling Robust Protection for Bare-metal Systems Abraham A. Clements∗ , Naif Saleh Almakhdhub† , Khaled S. Saab‡ , Prashast Srivastava† , Jinkyu Koo† , Saurabh Bagchi† , Mathias Payer† ∗

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-12 19:44:12
14Terms of service / Identity management / Law / Privacy / Internet privacy / Attitude / Social psychology / Medical privacy / Psychology / Behavior

Poster: Why Privacy is All But Forgotten An Empirical Study of Privacy & Sharing Attitude Kovila P.L. Coopamootoo and Thomas Groß I. I NTRODUCTION Privacy and sharing are believed to share a dynamic and

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-13 16:46:26
15Computer security / Cybercrime / Cyberwarfare / Computer network security / Security engineering / Computing / National security / Deception technology / Cyberattack / Intrusion detection system / Botnet / Denial-of-service attack

Poster: A Website Protection Framework Against Targeted Attacks based on Cyber Deception Jianbao Lin*, Chaoge Liu†, Xiang Cui*†‡, Zhaopeng Jia* * Beijing University of Posts and Telecommunications, Beijing, China

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-15 12:53:26
16Denial-of-service attacks / Statistical inference / Cyberwarfare / Estimation theory / Computing / Denial-of-service attack / Internet Relay Chat / Domain name system / Anycast / Cross-validation / Regression analysis / Prediction

Poster: A DDoS Peak Traffic Volume Prediction Method Based on Machine Learning Shuang Wei† , Yijing Ding† , Tongxin Li† , Shuaifu Dai‡ , Xinfeng Wu† and Xinhui Han†∗ † Peking University ‡ CNCERT/CC

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-27 07:43:28
17Computing / Fingerprinting algorithms / Cryptography / Identification / Internet privacy / Biometrics / Computer network security / Device fingerprint / Internet fraud / Public key fingerprint / Fingerprint / Tor

Poster: Identify and Track Web Attacker Based on Deceptive Technology and Browser Fingerprint Heyang Lv1 Binxing Fang2 Xiang Cui3,4 1 Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-12 06:46:30
18Graph theory / Mathematics / Computing / Representation theory / Littelmann path model / Resource Description Framework / Line graph

PredicateFinding_poster.pdf

Add to Reading List

Source URL: gdac.uqam.ca

Language: English - Date: 2017-10-04 00:21:32
19Computer security / Security engineering / Cyberwarfare / Prevention / Cybercrime / National security / Computer network security / Cyberattack / Capture the flag / Information security / Denial-of-service attack

Poster: Shell We Play A Game? CTF-as-a-service for Security Education Adam Doup´e and Giovanni Vigna Arizona State University and UC Santa Barbara ,

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-13 00:24:26
20Computer network security / Computing / Cyberwarfare / Multi-agent systems / Spamming / Cybercrime / Botnet / Influence diagram / Bayesian network / Computer security

Poster: Bottleneck: A Generalized, Flexible, and Extensible Framework for Botnet Defense Naurin Rasheed Ramay∗ , Sheharbano Khattak† , Affan A. Syed‡ Syed Ali Khayam§

Add to Reading List

Source URL: sheharbano.com

Language: English - Date: 2017-02-16 07:58:24
UPDATE