Identification of library functions statically linked to Linux malware without symbols

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Understanding Linux Malware

For the past two decades, the security community has been fighting malicious programs for Windows-based operating systems. However, the recent surge in adoption of embedded devices and the IoT revolution are rapidly changing the malware landscape. Embedded devices are profoundly different than traditional personal computers. In fact, while personal computers run predominantly on x86-flavored ar...

متن کامل

Identification of DNA Markers Linked to Blooming Time in Almond

In this study flowering time and other important morphologic traits were evaluated during two years in F1 almond progenies of seventy two seedlings from cross between the intermediate flowering Italian cultivar ‘Tuono’ and the extra-late blooming Iranian cultivar ‘Shahrood-12’. A modified-bulk segregant analysis in combination with the application of the 140 RAPD primers, 87 nuclear ...

متن کامل

Feature Models in Linux: From Symbols to Semantics

Linux is a highly configurable operating-system kernel which has been widely studied in the context of software product lines over the past years. Understanding the challenges and perils of evolving and maintaining feature models of the size of Linux is crucial to provide the right tools for development today and to direct future research. Unfortunately, previous studies show contradictory obse...

متن کامل

The Native POSIX Thread Library for Linux

The Linux Threads library which is currently part of the standard runtime environment of a Linux system does a poor job of satisfying the demand for POSIX compliant threading used in modern systems. It is not designed to leverage the Linux kernel extensions present and in development today, it does not scale efficiently, and it does not take modern processor architectures into account. A comple...

متن کامل

Modular Symbols and L-functions

As the rst non-overview lecture in this seminar, we will be setting up a lot of notation, getting comfortable working with modular symbols, and then hopefully discussing some of the major inputs which make the theory work. The rst half of the talk we will work through the example of the unique cusp form of weight two and level 11 on X0(11). In the second half, we will bring in the theoretical r...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Procedia Computer Science

سال: 2020

ISSN: 1877-0509

DOI: 10.1016/j.procs.2020.09.053