Identification of library functions statically linked to Linux malware without symbols
نویسندگان
چکیده
منابع مشابه
Understanding Linux Malware
For the past two decades, the security community has been fighting malicious programs for Windows-based operating systems. However, the recent surge in adoption of embedded devices and the IoT revolution are rapidly changing the malware landscape. Embedded devices are profoundly different than traditional personal computers. In fact, while personal computers run predominantly on x86-flavored ar...
متن کاملIdentification of DNA Markers Linked to Blooming Time in Almond
In this study flowering time and other important morphologic traits were evaluated during two years in F1 almond progenies of seventy two seedlings from cross between the intermediate flowering Italian cultivar ‘Tuono’ and the extra-late blooming Iranian cultivar ‘Shahrood-12’. A modified-bulk segregant analysis in combination with the application of the 140 RAPD primers, 87 nuclear ...
متن کاملFeature Models in Linux: From Symbols to Semantics
Linux is a highly configurable operating-system kernel which has been widely studied in the context of software product lines over the past years. Understanding the challenges and perils of evolving and maintaining feature models of the size of Linux is crucial to provide the right tools for development today and to direct future research. Unfortunately, previous studies show contradictory obse...
متن کاملThe Native POSIX Thread Library for Linux
The Linux Threads library which is currently part of the standard runtime environment of a Linux system does a poor job of satisfying the demand for POSIX compliant threading used in modern systems. It is not designed to leverage the Linux kernel extensions present and in development today, it does not scale efficiently, and it does not take modern processor architectures into account. A comple...
متن کاملModular Symbols and L-functions
As the rst non-overview lecture in this seminar, we will be setting up a lot of notation, getting comfortable working with modular symbols, and then hopefully discussing some of the major inputs which make the theory work. The rst half of the talk we will work through the example of the unique cusp form of weight two and level 11 on X0(11). In the second half, we will bring in the theoretical r...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Procedia Computer Science
سال: 2020
ISSN: 1877-0509
DOI: 10.1016/j.procs.2020.09.053