Now showing items 1-2 of 2
TOWARDS IMPROVING VIRTUAL MACHINE SECURITY IN THE CLOUD
Author(s):Aloysius Navamani, Beaulah
Cloud computing is very appealing for its convenient central management, the elasticity of resource provisioning and its economic benefits. Undoubtedly, the non-transparent nature of the Cloud infrastructure introduces ...
Malware provenance : detecting code reuse in malicious software
Author(s):Upchurch, Jason R.
Detecting code reuse in software has applications in malicious code analysis and malware code search and retrieval, but is complicated by the lack of available source code. Malware Provenance examines the difficulties in ...