Ausgabe 3/2010
Inhalt (6 Artikel)
Eicar 2008 extended version
Measuring virtual machine detection in malware using DSD tracer
Boris Lau, Vanja Svajcer
Original Paper
SinFP, unification of active and passive operating system fingerprinting
Patrice Auffret
Original Paper
Cryptography: all-out attacks or how to attack cryptography without intensive cryptanalysis
Jean-Baptiste Bedrune, Éric Filiol, Frédéric Raynal
Original Paper
Using the KBTA method for inferring computer and network security alerts from time-stamped, raw system metrics
Asaf Shabtai, Yuval Fledel, Yuval Elovici, Yuval Shahar
Original Paper
From the design of a generic metamorphic engine to a black-box classification of antivirus detection techniques
Jean-Marie Borello, Éric Filiol, Ludovic Mé