Mostrando 3 resultados de: 3
Publisher
IET Information Security(1)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)(1)
Proceedings of the ACM Conference on Computer and Communications Security(1)
Certified PUP: Abuse in authenticode code signing
Conference ObjectAbstract: Code signing is a solution to verify the integrity of software and its publisher's identity, but itPalabras claves:Code Signing, Malware, PUP, Windows AuthenticodeAutores:Caballero J., Kotzias P., Matic S., Richard RiveraFuentes:googlescopusAvclass: A tool for massive malware labeling
Conference ObjectAbstract: Labeling a malicious executable as a variant of a known family is important for security applicationPalabras claves:AV labels, classification, Clustering, Malware labelingAutores:Caballero J., Kotzias P., Richard Rivera, Sebastián M.Fuentes:googlescopusCostly freeware: A systematic analysis of abuse in download portals
ArticleAbstract: Freeware is proprietary software that can be used free of charge. A popular vector for distributingPalabras claves:Autores:Caballero J., Kotzias P., Richard Rivera, Sudhodanan A.Fuentes:googlescopus