publié le: February 2010
An alarming trend in recent malware incidents is that they are armed with stealthy techniques to detect, evade, and subvert malware detection facilit...
Low-latency anonymity systems such as Tor, AN.ON, Crowds, and Anonymizer.com aim to provide anonymous connections that are both untraceable by “local...
SQL injection attacks are one of the top-most threats for applications written for the Web. These attacks are launched through specially crafted user...
Payload attribution can be an important element in network forensics. Given a history of packet transmissions and an excerpt of a possible packet pay...
In this article, we propose a new voting protocol with several desirable security properties. The voting stage of the protocol can be performed by hum...