Conferences related to Invasive software

Back to Top

2023 Annual International Conference of the IEEE Engineering in Medicine & Biology Conference (EMBC)

The conference program will consist of plenary lectures, symposia, workshops and invitedsessions of the latest significant findings and developments in all the major fields of biomedical engineering.Submitted full papers will be peer reviewed. Accepted high quality papers will be presented in oral and poster sessions,will appear in the Conference Proceedings and will be indexed in PubMed/MEDLINE.


2020 35th IEEE/ACM International Conference on Automated Software Engineering (ASE)

The IEEE/ACM Automated Software Engineering (ASE) Conference series is the premier research forum for automated software engineering. Each year, it brings together researchers and practitioners from academia and industry to discuss foundations, techniques and tools for automating the analysis, design, implementation, testing, and maintenance of large software systems.


2020 IEEE International Conference on Robotics and Automation (ICRA)

The International Conference on Robotics and Automation (ICRA) is the IEEE Robotics and Automation Society’s biggest conference and one of the leading international forums for robotics researchers to present their work.


2020 IEEE International Conference on Systems, Man, and Cybernetics (SMC)

The 2020 IEEE International Conference on Systems, Man, and Cybernetics (SMC 2020) will be held in Metro Toronto Convention Centre (MTCC), Toronto, Ontario, Canada. SMC 2020 is the flagship conference of the IEEE Systems, Man, and Cybernetics Society. It provides an international forum for researchers and practitioners to report most recent innovations and developments, summarize state-of-the-art, and exchange ideas and advances in all aspects of systems science and engineering, human machine systems, and cybernetics. Advances in these fields have increasing importance in the creation of intelligent environments involving technologies interacting with humans to provide an enriching experience and thereby improve quality of life. Papers related to the conference theme are solicited, including theories, methodologies, and emerging applications. Contributions to theory and practice, including but not limited to the following technical areas, are invited.


2020 IEEE International Instrumentation and Measurement Technology Conference (I2MTC)

The Conference focuses on all aspects of instrumentation and measurement science andtechnology research development and applications. The list of program topics includes but isnot limited to: Measurement Science & Education, Measurement Systems, Measurement DataAcquisition, Measurements of Physical Quantities, and Measurement Applications.


More Conferences

Periodicals related to Invasive software

Back to Top

Communications Magazine, IEEE

IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...


Communications Surveys & Tutorials, IEEE

Each tutorial reviews currents communications topics in network management and computer and wireless communications. Available tutorials, which are 2.5 to 5 hours in length contains the original visuals and voice-over by the presenter. IEEE Communications Surveys & Tutorials features two distinct types of articles: original articles and reprints. The original articles are exclusively written for IEEE Communications Surveys & Tutorials ...


Computer

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.


Computer-Aided Design of Integrated Circuits and Systems, IEEE Transactions on

Methods, algorithms, and human-machine interfaces for physical and logical design, including: planning, synthesis, partitioning, modeling, simulation, layout, verification, testing, and documentation of integrated-circuit and systems designs of all complexities. Practical applications of aids resulting in producible analog, digital, optical, or microwave integrated circuits are emphasized.


Computers, IEEE Transactions on

Design and analysis of algorithms, computer systems, and digital networks; methods for specifying, measuring, and modeling the performance of computers and computer systems; design of computer components, such as arithmetic units, data storage devices, and interface devices; design of reliable and testable digital devices and systems; computer networks and distributed computer systems; new computer organizations and architectures; applications of VLSI ...


More Periodicals

Most published Xplore authors for Invasive software

Back to Top

Xplore Articles related to Invasive software

Back to Top

Robotic System for Imagery-Guided Surgery [Industrial Activities]

IEEE Robotics & Automation Magazine, 2014

The radiology and surgery worlds need to merge for operations guided by imagery, such as mini-invasive procedures (stenting, valve implants, and so on). Consequently, the current trend is the hybridization of radiology and surgery rooms. These rooms are said to be hybrid when the operating room combines the features of a conventional cardiac surgery operating room with those of a ...


Masquerade on One-Time Password Authentication Scheme

Future Generation Communication and Networking (FGCN 2007), 2007

In 2002, Yeh et al. proposed a one-time password authentication scheme using smart cards. Later, Tsuji et al. and Ku et al. respectively showed that Yeh et al.'s scheme is vulnerable to stolen-verifier attacks. Recently, Lee and Chen proposed an improvement of Yeh et al.'s scheme. Lee and Chen claimed that their improvement can effectively withstand the stolen-verifier attack and ...


Techniques of user-mode detecting System Service Descriptor Table

2009 13th International Conference on Computer Supported Cooperative Work in Design, 2009

In order to protect system service descriptor table (SSDT) and discover the hook which is hidden in kernel module, we propose two methods which work in user-mode for detecting the hook of SSDT. The methods we propose are different from the method that must work in kernel-mode after loading rootkit drivers. The first method is using \device\physicalmemory to detect the ...


Invasive software, who's inside your computer

Computer, 2002

Technology frequently turns out to be a double-edged sword. For example, as technology has increased connectivity and network accessibility, concerns about privacy and security have grown. As this concern has increased, invasive technologies-such as those that let third parties plant software on a PC and monitor users' activities from across a LAN or the Internet-are becoming more sophisticated. The paper ...


A Practical Taint-Based Malware Detection

2008 International Conference on Apperceiving Computing and Intelligence Analysis, 2008

Malware has posted a great risk to the privacy of users and data. Unfortunately, current anomaly detection is both coarse-grained and ineffective to detect them, because some behaviors can only be triggered in specific circumstances, moreover, it is difficult to analyze and evaluate compromised data. In this paper, we address the two problems via taint-based analysis. First, we precisely characterize ...


More Xplore Articles

Educational Resources on Invasive software

Back to Top

IEEE.tv Videos

How Facial Analysis Technology Can Help Children with Genetic Disorders - IEEE Region 4 Technical Presentation
Non-Invasive Techniques for Monitoring Chronic Heart Failure - Harry Silber - IEEE EMBS at NIH, 2019
Surgical Robotics: Robotic assistance in minimally invasive and endoluminal interventions
The DLR MiroSurge, a Robotic System for Surgery
Some Recent Work in Computational Intelligence for Software Engineering
Lionel Briand on Software Engineering
Chuck Walrad on the value of software standards
Christoph Guger: Neuroscience & Brain Panel - The Future of Non-invasive Brain-computer Interfaces - TTM 2018
IMS 2011 Microapps - Quickwave Electromagnetic Software with CAD Input and GPU Processing
Q&A with Dr. Al Emondi: IEEE Brain Podcast, Episode 13
From THz imaging to millimeter-wave stimulation of neurons: Is there a killer application for high frequency RF in the medical community? (RFIC 2015 Keynote)
A Unified Hardware/Software Co-Design Framework for Neuromorphic Computing Devices and Applications - IEEE Rebooting Computing 2017
From Edge To Core: Memory-Driven Hardware and Software Co-Design - IEEE Rebooting Computing Industry Summit 2017
Open Source Software: Opportunities for Social Innovation from Around the World
A Principled Way to Use Frameworks in Architecture Design
Tony Hoare
Hardware-Software Co-Design for an Analog-Digital Accelerator for Machine Learning - Dejan Milojicic - ICRC 2018
Yesterday, Today and the Next Decade ? James Whittaker, Microsoft
Patentable Subject Matter and Software Patents - IEEE USA
IEEE Brain: Abbott Neuromodulation - The Importance and Practice of Late-stage Innovation

IEEE-USA E-Books

  • Robotic System for Imagery-Guided Surgery [Industrial Activities]

    The radiology and surgery worlds need to merge for operations guided by imagery, such as mini-invasive procedures (stenting, valve implants, and so on). Consequently, the current trend is the hybridization of radiology and surgery rooms. These rooms are said to be hybrid when the operating room combines the features of a conventional cardiac surgery operating room with those of a radiology room, thereby linking medical imaging and surgery.

  • Masquerade on One-Time Password Authentication Scheme

    In 2002, Yeh et al. proposed a one-time password authentication scheme using smart cards. Later, Tsuji et al. and Ku et al. respectively showed that Yeh et al.'s scheme is vulnerable to stolen-verifier attacks. Recently, Lee and Chen proposed an improvement of Yeh et al.'s scheme. Lee and Chen claimed that their improvement can effectively withstand the stolen-verifier attack and is as efficient as Yeh et al.'s scheme. This paper, however, will point out that Lee and Chen improvement is still vulnerable to a masquerade attack. And, a simple improvement is given to resist the masquerade attack.

  • Techniques of user-mode detecting System Service Descriptor Table

    In order to protect system service descriptor table (SSDT) and discover the hook which is hidden in kernel module, we propose two methods which work in user-mode for detecting the hook of SSDT. The methods we propose are different from the method that must work in kernel-mode after loading rootkit drivers. The first method is using \device\physicalmemory to detect the hook in user- mode, and the second one is using the function of NtSystemDebugControl to detect the hook in user-mode. The experimental results show that both methods can detect the hook of SSDT in user-mode. In addition, the user program simplifies the tedious process and avoids the disadvantages of loading drivers.

  • Invasive software, who's inside your computer

    Technology frequently turns out to be a double-edged sword. For example, as technology has increased connectivity and network accessibility, concerns about privacy and security have grown. As this concern has increased, invasive technologies-such as those that let third parties plant software on a PC and monitor users' activities from across a LAN or the Internet-are becoming more sophisticated. The paper discusses new invasive software such as Spyware, pop- over ads, e-mail tracking and Magic Lantern software.

  • A Practical Taint-Based Malware Detection

    Malware has posted a great risk to the privacy of users and data. Unfortunately, current anomaly detection is both coarse-grained and ineffective to detect them, because some behaviors can only be triggered in specific circumstances, moreover, it is difficult to analyze and evaluate compromised data. In this paper, we address the two problems via taint-based analysis. First, we precisely characterize malware behaviors in virtual environments, where behaviors can be completely explored by tainting return values of security-related system calls in order to traverse multiple execution branches. Second, sensitive data are also tainted to track their propagation to determine whether they are transmitted maliciously. A supporting distributed architecture is presented to optimize efficiency. Our approach is an effective complement to current anomaly-based models. The initial experiment demonstrates our system can detect a variety of malware with high accuracy and low overhead.

  • Extended abstract: Trustworthy system security through 3-D integrated hardware

    While hardware resources in the form of both transistors and full microprocessor cores are now abundant, economic factors prevent specialized hardware mechanisms required for secure processing from being integrated into commodity parts. We are exploring a novel way in which commodity hardware can be augmented after fabrication to enhance secure operation for only those systems that require it. Our methods will be applicable to a wide range of security problems, including the detection and isolation of hardware subversion and Trojan horses, cache-based side channels in chip multi- processors (CMPs), embedded systems security, and hardware intrusion detection and prevention.

  • Analyze and Model the Primitive Attacking Mechanisms of Malicious Codes

    So far, researches on the topic of malicious code are mainly focused on the defending models and mechanisms against them. However, understanding how malicious code works is critical to preventing it effectively. This paper investigates the attacks that most recent malicious codes exhibit. By dissecting the combined malicious logic of them, it defines computer virus, worm, Trojan horse, and data-driven attack as the primitive attacking payloads of contemporary malicious codes. Models for each of the primitive attacks are then researched. Based on F. Cohenpsilas virus definition, how computer virus infects and propagates are formally described. By analyzing the code structure of a worm program, a model for worm network is presented. At last, data-driven attack is formally defined and how it threats to system security is analyzed.

  • Implementation and overhead analysis of a log-based intrusion recovery module on Linux file system

    Most people always want to get reliable information, even if there are intrusions that illegitimate hacker damages to file systems through operations modifying, appending, and deleting files. To accomplish this, we need the recovery function with transparent to user and return to its former state. This paper proposes design and implementation of a log-based intrusion recovery module (LBIRM). It can keep the previous contents of designated files as a chain of logs and recover the damaged file by using the log.

  • Understanding the Construction Mechanism of Botnets

    The botnet construction mechanism (BCM) is one of the key technologies of the botnets and the most important issue to both the attackers and the defenders. To the best of our knowledge, although the BCM has been mentioned in many researching papers, it has not been systemically studied. In this paper, we attempt to discuss the BCM methodically. We first give both the definition and its formalized definition of the BCM, and then address the BCM through four components: the bot propagating mechanism, the bot joining mechanism, the construction mechanism of topology and the performances of the botnet. We further detail the elements of the four components and study the compatibilities between those elements. Finally we discuss the advantages and disadvantages of each element.

  • Information flows in e-government

    Classical MAC and DAC are reexamined in the light of e-government. In this paper, we focus on the information flows, which have been addressed by classical MAC, in my view, somewhat inadequately, and never been addressed by classical DAC.



Standards related to Invasive software

Back to Top

No standards are currently tagged "Invasive software"


Jobs related to Invasive software

Back to Top