A three-way decision making approach to malware analysis using probabilistic rough sets
Malware analysis aims to identify malware by examining applications behaviour on the host
operating system. A common issue in malware analysis is how to mitigate and handle the …
operating system. A common issue in malware analysis is how to mitigate and handle the …
Integrity verification and behavioral classification of a large dataset applications pertaining smart OS via blockchain and generative models
Malware analysis and detection over the Android have been the focus of considerable
research, during recent years, as customer adoption of Android attracted a corresponding …
research, during recent years, as customer adoption of Android attracted a corresponding …
Design and implementation of an efficient framework for behaviour attestation using n-call slides
We present design and implementation of behaviour based attestation of an enterprise
centric application. Remote attestation is used to measure the trustworthiness of the target …
centric application. Remote attestation is used to measure the trustworthiness of the target …
On the Design and Security of Collective Remote Attestation Protocols
Collective remote attestation (CRA) is a security service that aims to efficiently identify
compromised (often low-powered) devices in a (heterogeneous) network. The last few years …
compromised (often low-powered) devices in a (heterogeneous) network. The last few years …
The remote attestation design based on the identity and attribute certificates
Y Liang, KE Guo, J Li - 2014 11th International Computer …, 2014 - ieeexplore.ieee.org
In order to solve the problem of trusted authentication between terminals, as well as
terminals and the server, and to establish a safe and reliable network environment, a remote …
terminals and the server, and to establish a safe and reliable network environment, a remote …
Clustering system call arguments for remote attestation
H Li, X Tian, W Wei, C Sun - International Conference on Network …, 2012 - Springer
In trusted computing, remote attestation is an essential feature to determine the
trustworthiness of a remote platform by analyzing its integrity. In this paper, we present a …
trustworthiness of a remote platform by analyzing its integrity. In this paper, we present a …
Multiple Objective Compromise Optimization Method to Analyze the Strategies of Nanotechnology in Taiwan
HK Chiou, GS Liu, GH Tzeng… - 2009 Symposia and …, 2009 - ieeexplore.ieee.org
Analytic Hierarchy Process (AHP) is a popular technique often used to model subjective
decision-making processes based on multiple attributes; Hwang and Yoon (1981) originally …
decision-making processes based on multiple attributes; Hwang and Yoon (1981) originally …
A complete behavioral measurement and reporting: optimized for mobile devices
Security is an important factor in today's IT infrastructure due to complex and vast variety of
malware threats. One way to tackle these malware is via signaturebased techniques …
malware threats. One way to tackle these malware is via signaturebased techniques …
An Efficient and Flexible Dynamic Remote Attestation Method
H Li, S Wang - 2014 Ninth International Conference on …, 2014 - ieeexplore.ieee.org
Remote attestation is an important characteristic of trusted computing technology which
provides reliable evidence that a trusted environment actually exists. In this paper, we …
provides reliable evidence that a trusted environment actually exists. In this paper, we …
Achieving attestation with less effort: an indirect and configurable approach to integrity reporting
This paper proposes an indirect attestation paradigm for verifying the trustworthiness of end
user platforms. This approach overcomes several criticisms of attestation by maintaining the …
user platforms. This approach overcomes several criticisms of attestation by maintaining the …