Cited By
View all- Lamowski BWeinhold CLackorzynski AHärtig HLawall J(2017)SandcrustProceedings of the 9th Workshop on Programming Languages and Operating Systems10.1145/3144555.3144562(51-57)Online publication date: 28-Oct-2017
As we know, we are already facing IoT threat and under IoT attacks. However, there are only a few discussions on, how to analyze this kind of cyber threat and malwares. In this paper, we propose IoT sandbox which can support different type of CPU ...
The large amounts of malware, and its diversity, have made it necessary for the security community to use automated dynamic analysis systems. These systems often rely on virtualization or emulation, and have recently started to be available to process ...
Malicious code is a serious issue which regularly threatens the security of computer systems and act as a challenging task for cyber security& Information security personals. Malicious code is named differently according to their specification such as ...
IEEE Computer Society
United States