Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Browse All Reviews > Software (D) > Operating Systems (D.4) > Security and Protection (D.4.6) > Invasive Software (D.4.6...)  
 
Options:
 
  1-10 of 33 Reviews about "Invasive Software (D.4.6...)": Date Reviewed
  Effective usage of redundancy to aid neutralization of hardware Trojans in integrated circuits
Gunti N., Lingasubramanian K.  Integration, the VLSI Journal 59 233-242, 2017. Type: Article

Hardware Trojans (HTs) are a major concern in cyber-physical systems security. Outsourcing activities related to the design and implementation of digital systems expose them to malicious modification. Such modifications may long stay silent, not d...

Nov 22 2017
   Targeted cyberattacks: a superset of advanced persistent threats
Sood A., Enbody R.  IEEE Security and Privacy 11(1): 54-61, 2013. Type: Article

Insight into the many threats that lurk in our software is presented in this paper. It also provides a useful introduction to the state of the art of malware. It will be especially useful for those doing research on malware or for practitioners de...

May 16 2014
  Characterizing hypervisor vulnerabilities in cloud computing servers
Perez-Botero D., Szefer J., Lee R.  CloudComputing 2013 (Proceedings of the 2013 International Workshop on Security in Cloud Computing, Hangzhou, China,  May 8, 2013) 3-10, 2013. Type: Proceedings, Reviews: (2 of 2)

Security, in every application of the concept, is a constantly moving target: once defenders identify and patch a vulnerability, attackers move on to the next weak spot. Efforts are therefore required to track the path of exposures through systems...

Oct 9 2013
  Characterizing hypervisor vulnerabilities in cloud computing servers
Perez-Botero D., Szefer J., Lee R.  CloudComputing 2013 (Proceedings of the 2013 International Workshop on Security in Cloud Computing, Hangzhou, China,  May 8, 2013) 3-10, 2013. Type: Proceedings, Reviews: (1 of 2)

Cloud computing security issues can make or break the confidence of consumers and industries considering the adoption of cloud services. One of the most important security threats in cloud platforms involves attacks at the hypervisor level, which ...

Oct 8 2013
  Titans’ revenge: detecting Zeus via its own flaws
Riccardi M., Di Pietro R., Palanques M., Vila J.  Computer Networks 57(2): 422-435, 2013. Type: Article

Malware has become an underground industry, rapidly evolving in response to attempts by computer security experts and organizations to keep it in check. One of the most notorious examples of this pattern is Zeus malware, and specifically the Zeus ...

Jul 30 2013
  Automatic malware analysis: an emulator based approach
Yin H., Song D.,  Springer Publishing Company, Incorporated, New York, NY, 2013. 82 pp. Type: Book (978-1-461455-22-6)

Malware refers to software written with malicious intent. It is virtually impossible to use a computer these days without being affected by this problem and spending significant effort to protect against the threats it presents. The speed of innov...

May 23 2013
  iOS hacker’s handbook
Miller C., Blazakis D., Dai Zovi D., Esser S., Iozzo V., Weinmann R.,  Wiley Publishing, Indianapolis, IN, 2012. 408 pp. Type: Book (978-1-118204-12-2)

With the extensive use of iOS devices all over the world, threats become more harmful. Think of a monoculture in food production: natural plagues become real menaces to subsistence when larger and larger tracts of land are dedicated to one single ...

Feb 5 2013
  Practical malware analysis: the hands-on guide to dissecting malicious software
Sikorski M., Honig A.,  No Starch Press, San Francisco, CA, 2012. 800 pp. Type: Book (978-1-593272-90-6)

An important topic for system security is addressed in this book. The analysis of malicious software is essential for incident response and digital forensics, and requires both advanced technical skills and operational process experience. Sikorski...

Jul 12 2012
  Reciprocity attacks
Zhu F., Carpenter S., Kulkarni A., Kolimi S.  SOUPS 2011 (Proceedings of the 7th Symposium on Usable Privacy and Security, Pittsburgh, PA,  Jul 20-22, 2011) 1-14, 2011. Type: Proceedings

Feng Zhu et al. report on the experimental use of reciprocity for information security attacks in computing environments that are mobile or pervasive. Reciprocity here refers to the psychological phenomenon of reducing resistance to divulging priv...

May 21 2012
  Malware analyst’s cookbook and DVD: tools and techniques for fighting malicious code
Ligh M., Adair S., Hartstein B., Richard M.,  Wiley Publishing, Indianapolis, IN, 2010. 744 pp. Type: Book (978-0-470613-03-0)

Ligh et al. present a pragmatic and recipe-driven reference for learning and performing malware analysis. Current malware is highly complex, due to ever-evolving Internet expansion and ubiquity, end-user behavior and reliance on permanent connecti...

Aug 11 2011
 
 
 
Display per page
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2022 ThinkLoud, Inc.
Terms of Use
| Privacy Policy