Narrow your search

Library

AP (3)

KDG (3)

KU Leuven (2)

Odisee (2)

Thomas More Kempen (2)

Thomas More Mechelen (2)

UCLL (2)

ULB (2)

ULiège (2)

VIVES (2)

More...

Resource type

book (4)

digital (4)


Language

English (7)


Year
From To Submit

2018 (2)

2016 (3)

2013 (2)

Listing 1 - 7 of 7
Sort by

Book
Android Application Security : A Semantics and Context-Aware Approach
Authors: ---
ISBN: 3319478117 3319478125 Year: 2016 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This SpringerBrief explains the emerging cyber threats that undermine Android application security. It further explores the opportunity to leverage the cutting-edge semantics and context–aware techniques to defend against such threats, including zero-day Android malware, deep software vulnerabilities, privacy breach and insufficient security warnings in app descriptions. The authors begin by introducing the background of the field, explaining the general operating system, programming features, and security mechanisms. The authors capture the semantic-level behavior of mobile applications and use it to reliably detect malware variants and zero-day malware. Next, they propose an automatic patch generation technique to detect and block dangerous information flow. A bytecode rewriting technique is used to confine privacy leakage. User-awareness, a key factor of security risks, is addressed by automatically translating security-related program semantics into natural language descriptions. Frequent behavior mining is used to discover and compress common semantics. As a result, the produced descriptions are security-sensitive, human-understandable and concise. By covering the background, current threats, and future work in this field, the brief is suitable for both professionals in industry and advanced-level students working in mobile security and applications. It is valuable for researchers, as well.

Keywords

Computer science. --- Computer communication systems. --- Computer security. --- Electrical engineering. --- Computer Science. --- Systems and Data Security. --- Computer Communication Networks. --- Communications Engineering, Networks. --- Application software --- Android (Electronic resource) --- Security measures. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Android operating system (Electronic resource) --- Android OS (Electronic resource) --- Google Android (Electronic resource) --- Android mobile operating system (Electronic resource) --- Telecommunication. --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Telecommunications --- Communication --- Information theory --- Telecommuting --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Electric engineering --- Engineering --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Distributed processing


Book
Automatic malware analysis : an emulator based approach
Authors: ---
ISSN: 21915768 ISBN: 1461455227 9786613937230 1461455235 1283624788 Year: 2013 Publisher: New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Malicious software (i.e., malware) has become a severe threat to interconnected computer systems for decades and has caused billions of dollars damages each year. A large volume of new malware samples are discovered daily. Even worse, malware is rapidly evolving becoming more sophisticated and evasive to strike against current malware analysis and defense systems.  Automatic Malware Analysis presents a virtualized malware analysis framework that addresses common challenges in malware analysis. In regards to this new analysis framework, a series of analysis techniques for automatic malware analysis is developed. These techniques capture intrinsic characteristics of malware, and are well suited for dealing with new malware samples and attack mechanisms.

Keywords

Computer networks -- Security measures. --- Computer security. --- Electronic data processing departments -- Security measures. --- Malware (Computer software) --- Computer security --- Engineering & Applied Sciences --- Computer Science --- Computer code, Malicious --- Malevolent software --- Malicious computer code --- Malicious software --- Software, Malevolent --- Software, Malicious --- Computer science. --- Data structures (Computer science). --- Data encryption (Computer science). --- Computers. --- Computer Science. --- Systems and Data Security. --- Data Encryption. --- Data Structures, Cryptology and Information Theory. --- Information Systems and Communication Service. --- Information Systems Applications (incl. Internet). --- Computer software --- Data structures (Computer scienc. --- Information systems. --- Cryptology. --- Data Structures and Information Theory. --- Data structures (Computer science) --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Cybernetics --- Machine theory --- Calculators --- Cyberspace


Digital
Automatic Malware Analysis : An Emulator Based Approach
Authors: ---
ISBN: 9781461455233 Year: 2013 Publisher: New York, NY Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract

Malicious software (i.e., malware) has become a severe threat to interconnected computer systems for decades and has caused billions of dollars damages each year. A large volume of new malware samples are discovered daily. Even worse, malware is rapidly evolving becoming more sophisticated and evasive to strike against current malware analysis and defense systems.  Automatic Malware Analysis presents a virtualized malware analysis framework that addresses common challenges in malware analysis. In regards to this new analysis framework, a series of analysis techniques for automatic malware analysis is developed. These techniques capture intrinsic characteristics of malware, and are well suited for dealing with new malware samples and attack mechanisms.


Digital
Research Progress in Oligosaccharins
Authors: ---
ISBN: 9781493935185 Year: 2016 Publisher: New York, NY Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract

"Research Progress in Oligosaccharins" is a valuable tool for students and researchers who want to learn about this unique class of bioactive compounds. This book provides important insight into the complex roles of oligosaccharins in plant immunity, physiology, and protection. Oligosaccharins are complex carbohydrates that function in plants as molecular signals to regulate growth, development, and stress resistance. Based on the rapid development of glycobiology and molecular biology, a great deal of research work focused on oligosaccharins has been carried out in the last thirty years. As a result, several different oligosaccharins such as chitosan oligosaccharides, chitin oligosaccharides, glucan oligosaccharides, alginate oligosaccharides have been identified and their mechanisms of actions studied. Although major recent advancements have been made, there isn’t an up-to-date systemic overview on the topic. Our objective is therefore to create a work that informs the reader of the nature of oligosaccharins, the different kinds of oligosaccharins, their functions and the mechanism of oligosaccharins-plants interaction.


Digital
Android Application Security : A Semantics and Context-Aware Approach
Authors: ---
ISBN: 9783319478128 Year: 2016 Publisher: Cham Springer International Publishing

Loading...
Export citation

Choose an application

Bookmark

Abstract

This SpringerBrief explains the emerging cyber threats that undermine Android application security. It further explores the opportunity to leverage the cutting-edge semantics and context–aware techniques to defend against such threats, including zero-day Android malware, deep software vulnerabilities, privacy breach and insufficient security warnings in app descriptions. The authors begin by introducing the background of the field, explaining the general operating system, programming features, and security mechanisms. The authors capture the semantic-level behavior of mobile applications and use it to reliably detect malware variants and zero-day malware. Next, they propose an automatic patch generation technique to detect and block dangerous information flow. A bytecode rewriting technique is used to confine privacy leakage. User-awareness, a key factor of security risks, is addressed by automatically translating security-related program semantics into natural language descriptions. Frequent behavior mining is used to discover and compress common semantics. As a result, the produced descriptions are security-sensitive, human-understandable and concise. By covering the background, current threats, and future work in this field, the brief is suitable for both professionals in industry and advanced-level students working in mobile security and applications. It is valuable for researchers, as well.


Book
Signal and Acoustic Modeling for Speech and Communication Disorders

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords


Multi
Signal and Acoustic Modeling for Speech and Communication Disorders

Loading...
Export citation

Choose an application

Bookmark

Abstract

Listing 1 - 7 of 7
Sort by