Cryptography Reference
In-Depth Information
4. Bowen, B.M., Prabhu, P., Kemerlis, V.P., Sidiroglou, S., Keromytis, A.D., Stolfo,
S.J.: BotSwindler: Tamper resistant injection of believable decoys in VM-based
hosts for crimeware detection. In: Jha, S., Sommer, R., Kreibich, C. (eds.) RAID
2010. LNCS, vol. 6307, pp. 118-137. Springer, Heidelberg (2010)
5. Chandrasekaran, M., Vidyaraman, S., Upadhyaya, S.: SpyCon: Emulating User
Activities to Detect Evasive Spyware. In: Proc. of the Performance, Computing,
and Communications Conference (IPCCC), pp. 502-509 (May 2007)
6. Egele, M., Kruegel, C., Kirda, E., Yin, H., Song, D.: Dynamic spyware analysis.
In: Proc. of the USENIX Annual Technical Conference, Santa Clara, CA, USA,
pp. 233-246 (June 2007)
7. Fest, G.: Why thin is back in (March 2010),
http://www.americanbanker.com/usb issues/120 3/
why-thin-is-back-in-1014707-1.html
8. Holz, T., Engelberth, M., Freiling, F.: Learning More About the Underground
Economy: A Case-Study of Keyloggers and Dropzones. In: Backes, M., Ning, P.
(eds.) ESORICS 2009. LNCS, vol. 5789, pp. 1-18. Springer, Heidelberg (2009)
9. Lohr, S.: Thin-client boom, finally? (July 2007),
http://bits.blogs.nytimes.com/2007/07/26/thin-client-boom-finally/
10. Pappas, V., Bowen, B.M., Keromytis, A.D.: Crimeware swindling without virtual
machines. In: Burmester, M., Tsudik, G., Magliveras, S., Ilic, I. (eds.) ISC 2010.
LNCS, vol. 6531, pp. 196-202. Springer, Heidelberg (2011)
11. Richardson, T.: The rfb protocol, version 3.8,
http://realvnc.com/docs/rfbproto.pdf
12. The Security Division of EMC RSA. Malware and enterprise. White paper (April
2010)
13. Willems, C., Holz, T., Freiling, F.: Toward Automated Dynamic Malware Analysis
Using CWSandbox. In: Proc. of the IEEE Symposium on Security and Privacy
(S&P), pp. 32-39 (March 2007)
14. Jae Yang, S., Nieh, J., Selsky, M., Tiwari, N.: The performance of remote display
mechanisms for thin-client computing. In: ATEC 2002: Proceedings of the General
Track of the Annual Conference on USENIX Annual Technical Conference, pp.
131-146. USENIX Association, Berkeley (2002)
15. Yin, H., Song, D., Egele, M., Kruegel, C., Kirda, E.: Panaroma: Capturing System-
wide Information Flow for Malware Detection and Analysis. In: Proc. of the 14th
ACM Conference on Computer and Communications Security, pp. 116-127 (2007)
16. Zetter, K.: Google hack attack was ultra sophisticated, new details show (January
2010), http://www.wired.com/threatlevel/2010/01/operation-aurora/
 
 
Search WWH ::




Custom Search