This paper proposes behavioral footprinting, a new dimension of worm profiling based on worm infection sessions. A worm's infection session contains a number of steps (e.g., for probing, exploitation, and replicat...
详细信息
ISBN:
(纸本)1595934472
This paper proposes behavioral footprinting, a new dimension of worm profiling based on worm infection sessions. A worm's infection session contains a number of steps (e.g., for probing, exploitation, and replication) that are exhibited in certain order in every successful worm infection. Behavioral footprinting complements content-based signature by enriching a worm's profile, which will be used in worm identification, an important task in post worm attack investigation and recovery. We propose an algorithm to extract a worm's behavioral footprint from the worm's traffic traces. Our evaluation with a number of real worms and their variants confirms the existence of worms' behavioral footprints and demonstrates their effectiveness in worm identification. Copyright 2006 ACM.
Automatic verification techniques, which analyze all processes at once, typically do not scale well for large, complex concurrent software systems because of the theoretic barrier - PSPACE complexity in worst case. In...
详细信息
ISBN:
(纸本)1595931082
Automatic verification techniques, which analyze all processes at once, typically do not scale well for large, complex concurrent software systems because of the theoretic barrier - PSPACE complexity in worst case. In this paper, we present our tool named ARCATS (Architecture Refactoring and Compositional Analysis Tool Suite). ARCATS consists a set of tools to combat state explosion in a divide-and-conquer, hierarchical manner, which is also known as compositional analysis. We build these tools to seek out best combinations to scale the verification to larger software systems. Copyright 2006 ACM.
Recently, P2P (Peer to Peer) systems, direct file sharing systems among the peers, are one of the most attractive file sharing system. P2P architectures have high scalability and high performance due to the fact that ...
详细信息
ISBN:
(纸本)8955191294
Recently, P2P (Peer to Peer) systems, direct file sharing systems among the peers, are one of the most attractive file sharing system. P2P architectures have high scalability and high performance due to the fact that its architectures which have characteristics of distributed file processing. However, P2P Architecture is infamous for distribution channel of illegal contents. So we must apply the DRM (Digital Rights Management) system to the P2P architecture, and we should keep advantages of P2P even if after DRM system applied. In this paper, we propose new type of DRM applied P2P system architecture that keeps existing P2P system's advantages.
Large teams of practitioners (developers, testers, etc.) usually work in parallel on the same code base. A major concern when working in parallel is the introduction of integration bugs in the latest shared code. Thes...
详细信息
This paper describes the design and implementations of the first application service based on embedded Linux;Mobile Teller which uses WiBro network for data communications and CDMA network for voice communications. Wh...
详细信息
ISBN:
(纸本)8955191294
This paper describes the design and implementations of the first application service based on embedded Linux;Mobile Teller which uses WiBro network for data communications and CDMA network for voice communications. When a sender on a dual-mode terminal types texts, the texts are transmitted to a TTS server located in the Internet through WiBro network. Subsequently, the TTS server changes the texts into voices and transmits the voice data to the dual-mode terminal. At last the dual-mode terminal sends the voice to the receiver through the CDMA network. In case of noisy environment, Mobile Teller makes user to voice communication.
Image inpainting is an artistic procedure to recover a damaged painting or picture. In this paper, we propose a novel approach for image inpainting. In this approach, the Mumford-Shah (MS) model and the level set meth...
详细信息
This paper describes a data replication service for large-scale, data intensive applications whose results can be shared among geographically distributed scientists. We introduce two kinds of data replication techniqu...
详细信息
Wireless sensor networks aim at a special kind of ad hoc networks, exposing an energy-constrained distributed computing environment. Proposed protocols have tried to incorporate power management schemas of the likes o...
详细信息
Globally distributed software development (GSD) and agile methods are two current and important trends in software and systems engineering. While agile methods seem to cope well with increasingly changing business env...
详细信息
Globally distributed software development (GSD) and agile methods are two current and important trends in software and systems engineering. While agile methods seem to cope well with increasingly changing business environments, it is far from obvious how these light-weight processes can best contribute to GSD. In this paper, method rationale is proposed as an analytical tool to understand the values that underpin agile methods and how these map to the GSD domain. Specifically, the paper presents an initial analysis of the values and goals embraced by the 'agile manifesto' and compares briefly with partial results from an ongoing study on the use of agile methods in GSD.
Cooperative caching is a very important technique for efficient data dissemination and sharing in mobile ad hoc networks (MANETs). Many applications have requirements on the consistency of the content cached on differ...
详细信息
暂无评论