Abstract—Behavior based intrusion detection technologies are increasingly popular. Traditionally behavior patterns are expressed as specific signatures defined in the system call domain. This approach has various drawbacks and is vulnerable to possible obfuscations. The IDS approach discussed herein addresses process behavior in terms of functionalities, i.e. particular process objectives. The functionalities are formalized in the form that is independent of their specific realizations and is obfuscation resistant. The malware is detected by particular sets of functionalities exposed by programs during their execution. The approach implies the selection of common malicious functionalities, followed by formal description of these functionali...
Abstract—Formal methods are often used to prove prop-erties of network protocols, including required...
A process language for security protocols is presented together with a semantics in terms of sets of...
Abstract. Recently cyber security has emerged as an established discipline for computer systems and ...
The aim of this article is to present an approach to develop and verify a method of formal modeling ...
Part 9: Various Aspects of Computer SecurityInternational audienceWe propose a solution which provid...
This paper describes a generic model of matching that can be usefully applied to misuse intrusion de...
This report examines and classifies the characteristics of signatures used in misuse intrusion detec...
Master's thesis in Computer scienceIn recent years, network has penetrated into every aspect of our ...
[[abstract]]In this paper, we propose a dynamic forensics system (DFS) with intrusion tolerance by u...
[[abstract]]In this paper, we propose a dynamic forensics system (DFS) with intrusion tolerance by u...
Designing security softwares that evolve as quickly as threats is a truthful challenge. In addition,...
Abstract—The researches have shown that not all the Petri Net machines can be used to describe attac...
While network worms are different in payloads and utilized exploits, they all have one common compon...
Nowaday, we use computers for everything from banking and investing to shopping and communicating wi...
The paper presents a tool for verifying, during the system security design, security properties of d...
Abstract—Formal methods are often used to prove prop-erties of network protocols, including required...
A process language for security protocols is presented together with a semantics in terms of sets of...
Abstract. Recently cyber security has emerged as an established discipline for computer systems and ...
The aim of this article is to present an approach to develop and verify a method of formal modeling ...
Part 9: Various Aspects of Computer SecurityInternational audienceWe propose a solution which provid...
This paper describes a generic model of matching that can be usefully applied to misuse intrusion de...
This report examines and classifies the characteristics of signatures used in misuse intrusion detec...
Master's thesis in Computer scienceIn recent years, network has penetrated into every aspect of our ...
[[abstract]]In this paper, we propose a dynamic forensics system (DFS) with intrusion tolerance by u...
[[abstract]]In this paper, we propose a dynamic forensics system (DFS) with intrusion tolerance by u...
Designing security softwares that evolve as quickly as threats is a truthful challenge. In addition,...
Abstract—The researches have shown that not all the Petri Net machines can be used to describe attac...
While network worms are different in payloads and utilized exploits, they all have one common compon...
Nowaday, we use computers for everything from banking and investing to shopping and communicating wi...
The paper presents a tool for verifying, during the system security design, security properties of d...
Abstract—Formal methods are often used to prove prop-erties of network protocols, including required...
A process language for security protocols is presented together with a semantics in terms of sets of...
Abstract. Recently cyber security has emerged as an established discipline for computer systems and ...