Sandbox Evasive Remote Access Trojan

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Enter Sandbox: Android Sandbox Comparison

Expecting the shipment of 1 billion Android devices in 2017, cyber criminals have naturally extended their vicious activities towards Google’s mobile operating system. With an estimated number of 700 new Android applications released every day, keeping control over malware is an increasingly challenging task. In recent years, a vast number of static and dynamic code analysis platforms for analy...

متن کامل

Transparent Remote Access

In distributed systems, the different processors communicate via network messages. Object oriented systems do not focus on these messages, but on the responsibilities each object fulfils. Between the top-level objects it should be invisible on which system an addressed object resides. The Transparent Remote Access pattern gives a recipe how the implementation of a method can defer the invocatio...

متن کامل

Remote Access Background

This chapter describes, as an example of the use of remote access, the development of a computer telecommunications network linking primary health care practitioners throughout both the isolated rural and outback areas of Australia and insular urban general practitioners. This project is called the Primary Health Orientated Computer Users’ System, or PHOCUS. Details of project utilisation and u...

متن کامل

secmodel sandbox : An application sandbox for NetBSD (draft)

We introduce a new security model for NetBSD – secmodel sandbox – that allows per-process policies for restricting privileges. Privileges correspond to kauth authorization requests, such as a request to create a socket or read a file, and policies specify the sandbox’s decision: deny, defer, or allow. Processes may apply multiple sandbox policies to themselves, in which case the policies stack,...

متن کامل

Virtual Sandbox

Interactive applications such as virtual reality systems have become popular in recent years. A ground surface composed of a granular material can be deformed when it comes into contact with an object, and, in this paper, we propose a deformation algorithm for the ground surface which is useful for such applications. The deformation algorithm is divided into three steps: (1) detection of the co...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal for Research in Applied Science and Engineering Technology

سال: 2019

ISSN: 2321-9653

DOI: 10.22214/ijraset.2019.5317