Malware research

Results: 246



#Item
51Data types / Type theory / JavaScript / Computer security / Malware / Client honeypot / Internet Explorer 9 / C / Type system / Computing / Software / Cross-platform software

Rozzle: De-Cloaking Internet Malware Clemens Kolbitsch Benjamin Livshits and Benjamin Zorn Christian Seifert

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2012-03-06 19:36:00
52Computer architecture / Android software development / Android / Mobile operating system / Malware / Symbian / Linear temporal logic / Motorola Droid / Smartphones / Software / Computing

Runtime Verification meets Android Security Andreas Bauer1,2 , Jan-Christoph K¨uster1,2 , and Gil Vegliach1 1 NICTA Software Systems Research Group · 2 The Australian National University

Add to Reading List

Source URL: www.gilvegliach.it

Language: English - Date: 2014-02-20 13:15:14
53Computer crimes / Computer security / Malware / Vulnerability / Social engineering / Cloud computing / Phishing / Advanced persistent threat / Sotirios / Cybercrime / Computing / Cyberwarfare

Security and Privacy Research Challenges Sotiris Ioannidis Institute of Computer Science Foundation for Research and Technology - Hellas

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2014-11-07 15:06:11
54Embedded systems / Electromagnetism / EMC Corporation / Malware / Point of sale / Automated teller machine / Credit card / Magnetic stripe card / Technology / Payment systems / Business

The Latest Research on PoS Malware Numaan Huq Trend Micro Who am I?

Add to Reading List

Source URL: www.rsaconference.com

Language: English - Date: 2014-09-22 12:18:29
55Computer architecture / Android software development / Android / Mobile operating system / Malware / Symbian / Linear temporal logic / Motorola Droid / Smartphones / Software / Computing

Runtime Verification meets Android Security Andreas Bauer1,2 , Jan-Christoph K¨uster1,2 , and Gil Vegliach1 1 NICTA Software Systems Research Group · 2 The Australian National University

Add to Reading List

Source URL: kuester.multics.org

Language: English - Date: 2015-05-08 04:15:01
56Malware / Algorithm / Mathematical logic / Theoretical computer science

PDF Document

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2013-06-03 12:19:24
57Malware / Shellcode / Software bugs / Polymorphic code / Buffer overflow / Arbitrary code execution / Self-modifying code / Metasploit Project / Forth / Cyberwarfare / Computer security / Computing

Network-Level Polymorphic Shellcode Detection Using Emulation Michalis Polychronakis1 , Kostas G. Anagnostakis2 , and Evangelos P. Markatos1 1 Institute of Computer Science, Foundation for Research & Technology – Hell

Add to Reading List

Source URL: www.fp6-noah.org

Language: English - Date: 2006-05-02 06:32:56
58Spamming / Phishing / Social engineering / Cryptography / Password / PayPal / Internet privacy / Malware / SiteKey / Security / Espionage / Computing

So Long, And No Thanks for the Externalities: The Rational Rejection of Security Advice by Users Cormac Herley Microsoft Research One Microsoft Way Redmond, WA, USA

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2009-12-18 17:40:50
59Computer security / Malware / Denial-of-service attack / Proxy server / Email / Zero-day attack / Computer network security / Computing / Internet

Trend Micro Incorporated Research Paper 2012 IXESHE

Add to Reading List

Source URL: www.trendmicro.com

Language: English - Date: 2012-07-24 23:30:09
60Computing / Buffer overflow / Malware / Client honeypot / Computer network security / Spamming / Honeypot

SIXTH FRAMEWORK PROGRAMME Structuring the European Research Area Specific Programme RESEARCH INFRASTRUCTURES ACTION Contract No. RIDS

Add to Reading List

Source URL: www.fp6-noah.org

Language: English - Date: 2007-11-22 12:15:00
UPDATE