[EN] In this new era of technology and interconnected systems, the number of devices connected to the Internet has grown significantly, with more and more businesses and organizations offering services in the cloud and more users having all kinds of “smart“ connected IoT devices. With this, the number of attacks has also grown with the same pace if not faster, requiring new systems to ensure data integrity, confidentiality and privacy. The objective of the project is to ensure that the integrity of these devices is maintained by designing and developing a system capable of monitoring, detecting and notifying changes of files stored in the target filesystem. To accomplish that goal, the system will maintain a hash digest representation ...
The openness of access to information raises various problems, including maintaining the validity an...
As the foundation of the trusted computing base, the operating system kernel is a valuable target f...
Linux es el kernel más utilizado en los sistemas empotrados, dispositivos cuya disponibilidad públic...
This thesis looks at file execution as an attack vector that leads to the execution of unauthorized ...
AbstractThe file system becomes the usual target of malicious attacks because it contains lots of se...
Obfuscation and cryptography technologies are applied to malware to make the detection of malware th...
We present a novel method to trace the propagation of intrusions or malicious code in networked syst...
As embedded systems are more and more present in our lives, it is necessary to protect the personal ...
The present work is aimed to develop and analyze a novel model for distributed stateful intrusion de...
“... oba es gibt kan Kompromiß, zwischen ehrlich sein und link, a wann’s no so afoch ausschaut, und ...
We describe an anomaly detector, called FWRAP, for a Host-based Intrusion Detection System that moni...
In many fields, application software must be stable and withstand attacks. Due to the trend of the "...
This Ph.D thesis addresses the integrity preservation of current operating systems. The main goal is...
Keywords: Snort, IDS, Intrusion Detection System, Intrusion. ABSTRACT Software and hardware compon...
Computing platforms, such as embedded systems or laptops, are built with layers of preventive securi...
The openness of access to information raises various problems, including maintaining the validity an...
As the foundation of the trusted computing base, the operating system kernel is a valuable target f...
Linux es el kernel más utilizado en los sistemas empotrados, dispositivos cuya disponibilidad públic...
This thesis looks at file execution as an attack vector that leads to the execution of unauthorized ...
AbstractThe file system becomes the usual target of malicious attacks because it contains lots of se...
Obfuscation and cryptography technologies are applied to malware to make the detection of malware th...
We present a novel method to trace the propagation of intrusions or malicious code in networked syst...
As embedded systems are more and more present in our lives, it is necessary to protect the personal ...
The present work is aimed to develop and analyze a novel model for distributed stateful intrusion de...
“... oba es gibt kan Kompromiß, zwischen ehrlich sein und link, a wann’s no so afoch ausschaut, und ...
We describe an anomaly detector, called FWRAP, for a Host-based Intrusion Detection System that moni...
In many fields, application software must be stable and withstand attacks. Due to the trend of the "...
This Ph.D thesis addresses the integrity preservation of current operating systems. The main goal is...
Keywords: Snort, IDS, Intrusion Detection System, Intrusion. ABSTRACT Software and hardware compon...
Computing platforms, such as embedded systems or laptops, are built with layers of preventive securi...
The openness of access to information raises various problems, including maintaining the validity an...
As the foundation of the trusted computing base, the operating system kernel is a valuable target f...
Linux es el kernel más utilizado en los sistemas empotrados, dispositivos cuya disponibilidad públic...