359 resources related to Invasive software
- Topics related to Invasive software
- IEEE Organizations related to Invasive software
- Conferences related to Invasive software
- Periodicals related to Invasive software
- Most published Xplore authors for Invasive software
The conference program will consist of plenary lectures, symposia, workshops and invitedsessions of the latest significant findings and developments in all the major fields of biomedical engineering.Submitted full papers will be peer reviewed. Accepted high quality papers will be presented in oral and poster sessions,will appear in the Conference Proceedings and will be indexed in PubMed/MEDLINE.
The IEEE/ACM Automated Software Engineering (ASE) Conference series is the premier research forum for automated software engineering. Each year, it brings together researchers and practitioners from academia and industry to discuss foundations, techniques and tools for automating the analysis, design, implementation, testing, and maintenance of large software systems.
The International Conference on Robotics and Automation (ICRA) is the IEEE Robotics and Automation Society’s biggest conference and one of the leading international forums for robotics researchers to present their work.
The 2020 IEEE International Conference on Systems, Man, and Cybernetics (SMC 2020) will be held in Metro Toronto Convention Centre (MTCC), Toronto, Ontario, Canada. SMC 2020 is the flagship conference of the IEEE Systems, Man, and Cybernetics Society. It provides an international forum for researchers and practitioners to report most recent innovations and developments, summarize state-of-the-art, and exchange ideas and advances in all aspects of systems science and engineering, human machine systems, and cybernetics. Advances in these fields have increasing importance in the creation of intelligent environments involving technologies interacting with humans to provide an enriching experience and thereby improve quality of life. Papers related to the conference theme are solicited, including theories, methodologies, and emerging applications. Contributions to theory and practice, including but not limited to the following technical areas, are invited.
The Conference focuses on all aspects of instrumentation and measurement science andtechnology research development and applications. The list of program topics includes but isnot limited to: Measurement Science & Education, Measurement Systems, Measurement DataAcquisition, Measurements of Physical Quantities, and Measurement Applications.
IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...
Each tutorial reviews currents communications topics in network management and computer and wireless communications. Available tutorials, which are 2.5 to 5 hours in length contains the original visuals and voice-over by the presenter. IEEE Communications Surveys & Tutorials features two distinct types of articles: original articles and reprints. The original articles are exclusively written for IEEE Communications Surveys & Tutorials ...
Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.
Methods, algorithms, and human-machine interfaces for physical and logical design, including: planning, synthesis, partitioning, modeling, simulation, layout, verification, testing, and documentation of integrated-circuit and systems designs of all complexities. Practical applications of aids resulting in producible analog, digital, optical, or microwave integrated circuits are emphasized.
Design and analysis of algorithms, computer systems, and digital networks; methods for specifying, measuring, and modeling the performance of computers and computer systems; design of computer components, such as arithmetic units, data storage devices, and interface devices; design of reliable and testable digital devices and systems; computer networks and distributed computer systems; new computer organizations and architectures; applications of VLSI ...
IEEE Robotics & Automation Magazine, 2014
The radiology and surgery worlds need to merge for operations guided by imagery, such as mini-invasive procedures (stenting, valve implants, and so on). Consequently, the current trend is the hybridization of radiology and surgery rooms. These rooms are said to be hybrid when the operating room combines the features of a conventional cardiac surgery operating room with those of a ...
Future Generation Communication and Networking (FGCN 2007), 2007
In 2002, Yeh et al. proposed a one-time password authentication scheme using smart cards. Later, Tsuji et al. and Ku et al. respectively showed that Yeh et al.'s scheme is vulnerable to stolen-verifier attacks. Recently, Lee and Chen proposed an improvement of Yeh et al.'s scheme. Lee and Chen claimed that their improvement can effectively withstand the stolen-verifier attack and ...
2009 13th International Conference on Computer Supported Cooperative Work in Design, 2009
In order to protect system service descriptor table (SSDT) and discover the hook which is hidden in kernel module, we propose two methods which work in user-mode for detecting the hook of SSDT. The methods we propose are different from the method that must work in kernel-mode after loading rootkit drivers. The first method is using \device\physicalmemory to detect the ...
Technology frequently turns out to be a double-edged sword. For example, as technology has increased connectivity and network accessibility, concerns about privacy and security have grown. As this concern has increased, invasive technologies-such as those that let third parties plant software on a PC and monitor users' activities from across a LAN or the Internet-are becoming more sophisticated. The paper ...
2008 International Conference on Apperceiving Computing and Intelligence Analysis, 2008
Malware has posted a great risk to the privacy of users and data. Unfortunately, current anomaly detection is both coarse-grained and ineffective to detect them, because some behaviors can only be triggered in specific circumstances, moreover, it is difficult to analyze and evaluate compromised data. In this paper, we address the two problems via taint-based analysis. First, we precisely characterize ...
Surgical Robotics: Robotic assistance in minimally invasive and endoluminal interventions
The DLR MiroSurge, a Robotic System for Surgery
Some Recent Work in Computational Intelligence for Software Engineering
Lionel Briand on Software Engineering
Chuck Walrad on the value of software standards
Christoph Guger: Neuroscience & Brain Panel - The Future of Non-invasive Brain-computer Interfaces - TTM 2018
IMS 2011 Microapps - Quickwave Electromagnetic Software with CAD Input and GPU Processing
A Unified Hardware/Software Co-Design Framework for Neuromorphic Computing Devices and Applications - IEEE Rebooting Computing 2017
From Edge To Core: Memory-Driven Hardware and Software Co-Design - IEEE Rebooting Computing Industry Summit 2017
Open Source Software: Opportunities for Social Innovation from Around the World
Q&A with Dr. Al Emondi: IEEE Brain Podcast, Episode 13
From THz imaging to millimeter-wave stimulation of neurons: Is there a killer application for high frequency RF in the medical community? (RFIC 2015 Keynote)
A Principled Way to Use Frameworks in Architecture Design
Patentable Subject Matter and Software Patents - IEEE USA
ACADIS: brokering arctic data for research
Hardware-Software Co-Design for an Analog-Digital Accelerator for Machine Learning - Dejan Milojicic - ICRC 2018
Yesterday, Today and the Next Decade ? James Whittaker, Microsoft
Fog Software and Software Infrastructure Panel - Fog World Congress 2017
The radiology and surgery worlds need to merge for operations guided by imagery, such as mini-invasive procedures (stenting, valve implants, and so on). Consequently, the current trend is the hybridization of radiology and surgery rooms. These rooms are said to be hybrid when the operating room combines the features of a conventional cardiac surgery operating room with those of a radiology room, thereby linking medical imaging and surgery.
In 2002, Yeh et al. proposed a one-time password authentication scheme using smart cards. Later, Tsuji et al. and Ku et al. respectively showed that Yeh et al.'s scheme is vulnerable to stolen-verifier attacks. Recently, Lee and Chen proposed an improvement of Yeh et al.'s scheme. Lee and Chen claimed that their improvement can effectively withstand the stolen-verifier attack and is as efficient as Yeh et al.'s scheme. This paper, however, will point out that Lee and Chen improvement is still vulnerable to a masquerade attack. And, a simple improvement is given to resist the masquerade attack.
In order to protect system service descriptor table (SSDT) and discover the hook which is hidden in kernel module, we propose two methods which work in user-mode for detecting the hook of SSDT. The methods we propose are different from the method that must work in kernel-mode after loading rootkit drivers. The first method is using \device\physicalmemory to detect the hook in user- mode, and the second one is using the function of NtSystemDebugControl to detect the hook in user-mode. The experimental results show that both methods can detect the hook of SSDT in user-mode. In addition, the user program simplifies the tedious process and avoids the disadvantages of loading drivers.
Technology frequently turns out to be a double-edged sword. For example, as technology has increased connectivity and network accessibility, concerns about privacy and security have grown. As this concern has increased, invasive technologies-such as those that let third parties plant software on a PC and monitor users' activities from across a LAN or the Internet-are becoming more sophisticated. The paper discusses new invasive software such as Spyware, pop- over ads, e-mail tracking and Magic Lantern software.
Malware has posted a great risk to the privacy of users and data. Unfortunately, current anomaly detection is both coarse-grained and ineffective to detect them, because some behaviors can only be triggered in specific circumstances, moreover, it is difficult to analyze and evaluate compromised data. In this paper, we address the two problems via taint-based analysis. First, we precisely characterize malware behaviors in virtual environments, where behaviors can be completely explored by tainting return values of security-related system calls in order to traverse multiple execution branches. Second, sensitive data are also tainted to track their propagation to determine whether they are transmitted maliciously. A supporting distributed architecture is presented to optimize efficiency. Our approach is an effective complement to current anomaly-based models. The initial experiment demonstrates our system can detect a variety of malware with high accuracy and low overhead.
While hardware resources in the form of both transistors and full microprocessor cores are now abundant, economic factors prevent specialized hardware mechanisms required for secure processing from being integrated into commodity parts. We are exploring a novel way in which commodity hardware can be augmented after fabrication to enhance secure operation for only those systems that require it. Our methods will be applicable to a wide range of security problems, including the detection and isolation of hardware subversion and Trojan horses, cache-based side channels in chip multi- processors (CMPs), embedded systems security, and hardware intrusion detection and prevention.
So far, researches on the topic of malicious code are mainly focused on the defending models and mechanisms against them. However, understanding how malicious code works is critical to preventing it effectively. This paper investigates the attacks that most recent malicious codes exhibit. By dissecting the combined malicious logic of them, it defines computer virus, worm, Trojan horse, and data-driven attack as the primitive attacking payloads of contemporary malicious codes. Models for each of the primitive attacks are then researched. Based on F. Cohenpsilas virus definition, how computer virus infects and propagates are formally described. By analyzing the code structure of a worm program, a model for worm network is presented. At last, data-driven attack is formally defined and how it threats to system security is analyzed.
Most people always want to get reliable information, even if there are intrusions that illegitimate hacker damages to file systems through operations modifying, appending, and deleting files. To accomplish this, we need the recovery function with transparent to user and return to its former state. This paper proposes design and implementation of a log-based intrusion recovery module (LBIRM). It can keep the previous contents of designated files as a chain of logs and recover the damaged file by using the log.
The botnet construction mechanism (BCM) is one of the key technologies of the botnets and the most important issue to both the attackers and the defenders. To the best of our knowledge, although the BCM has been mentioned in many researching papers, it has not been systemically studied. In this paper, we attempt to discuss the BCM methodically. We first give both the definition and its formalized definition of the BCM, and then address the BCM through four components: the bot propagating mechanism, the bot joining mechanism, the construction mechanism of topology and the performances of the botnet. We further detail the elements of the four components and study the compatibilities between those elements. Finally we discuss the advantages and disadvantages of each element.
Classical MAC and DAC are reexamined in the light of e-government. In this paper, we focus on the information flows, which have been addressed by classical MAC, in my view, somewhat inadequately, and never been addressed by classical DAC.
No standards are currently tagged "Invasive software"