The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Digital forensic investigators today are faced with numerous problems when recovering footprints of criminal activity that involve the use of computer systems. Investigators need the ability to recover evidence in a forensically sound manner, even when criminals actively work to alter the integrity, veracity, and provenance of data, applications and software that are used to support illicit activities...
Cloud computing provides an opportunity for individuals and organizations to extend their capabilities by offering elastic computing resources. Trust is a major challenge in cloud computing. With trust, cloud users (trustees) can select the best available resources from cloud service providers (trustors) who in turn can evaluate users' behaviors and recommend users to other services. In this paper,...
A new electrochemical sensor based on the multiwalled carbon nanotube (MWCNT)/Li 4 Ti 5 O 12 -modified glassy carbon electrode for determination of bisphenol A (BPA) was developed by modifying the surface of a glassy carbon electrode with the prepared composite Li 4 Ti 5 O 12 /MWCNTs. The morphology and structure of the...
This paper argues about a new conceptual modeling language for the White-Box (WB) security analysis. In the WB security domain, an attacker may have access to the inner structure of an application or even the entire binary code. It becomes pretty easy for attackers to inspect, reverse engineer, and tamper the application with the information they steal. The basis of this paper is the 14 patterns developed...
The article is discussing new challenges faced by modern security systems because the traditional perimeter defenses against man-in-the-middle attacks are inadequate in protection against the man-at-the-end white-box attacks favored by many attackers.
The goal of software protection (SP) research is to make software safe from malicious attacks by preventing adversaries from tampering, reverse engineering, and illegally redistributing software. The Digital Asset Protection Association (DAPA) was launched in July 2011 to address the challenges of such attacks and SP research in general. As DAPA activities and efforts get underway, the ultimate goal...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.