Now showing items 1-2 of 2
Malware provenance : detecting code reuse in malicious software
Contributor:Upchurch, Jason R.
Detecting code reuse in software has applications in malicious code analysis and malware code search and retrieval, but is complicated by the lack of available source code. Malware Provenance examines the difficulties in ...
TOWARDS IMPROVING VIRTUAL MACHINE SECURITY IN THE CLOUD
Contributor:Aloysius Navamani, Beaulah
Cloud computing is very appealing for its convenient central management, the elasticity of resource provisioning and its economic benefits. Undoubtedly, the non-transparent nature of the Cloud infrastructure introduces ...