搜索结果: 1-8 共查到“军事学 malware”相关记录8条 . 查询时间(0.093 秒)
Remote Attestation (RA) is a popular means of detecting malware presence (or verifying its absence) on embedded and IoT devices. It is especially relevant to low-end devices that are incapable of prot...
Malware encryption schemes - rerandomizable ciphertexts encrypted using environmental keys
Malicious cryptography environmental keys rerandomization
2017/10/16
Protecting malware using encryption prevents an analyst, defending some computer(s) in the network, from analyzing the malicious code and identifying the intentions of the malware author. We discuss m...
Malware needs to execute on a target machine while simultaneously keeping its payload confidential from a malware analyst. Standard encryption can be used to ensure the confidentiality, but it does no...
Reverse-Engineering of the Cryptanalytic Attack Used in the Flame Super-Malware
MD5 hash function cryptanalysis
2016/3/18
In May 2012, a highly advanced malware for espionage dubbed Flame was found targeting the Middle-East. As it turned out, it used a forged signature to infect Windows machines by MITM-ing Windows Updat...
Provable Virus Detection: Using the Uncertainty Principle to Protect Against Malware
Malware Detection Provable Security Attestation
2015/12/24
Protecting software from malware injection is the holy grail
of modern computer security. Despite intensive efforts by
the scientific and engineering community, the number of successful
attacks con...
An Identity Based Encryption Scheme Resilient to RAM Scraper Like Malware Attacks
Glassbox Security Model Identity Based Encryption RAM Scraper
2015/12/21
. Modern software ecosystem is data-centric. Data exfiltration due to the attacks
of Memory Scraper type malwares is an emerging threat. In this paper, we set up
an appropriate mathematical model ca...
Tamper-Evident Digital Signatures;Protecting Certi¯cation Authorities Against Malware
covert channel subliminal channel tamper-evident undercover
2009/2/8
We introduce the notion of tamper-evidence for digital signature generation in order to
defend against attacks aimed at covertly leaking secret information held by corrupted network nodes.
This is a...
Browsers Defenses Against Phishing, Spoofing and Malware
browsers defenses phishing spoofing malware
2008/11/4
Web users are increasingly victims of phishing, spoofing and malware attacks. In this article, we discuss existing and proposed defense mechanisms. We highlight the vulnerabilities of current defenses...