نتایج جستجو برای: sandbox model
تعداد نتایج: 2104952 فیلتر نتایج به سال:
A malware is a program that has a malicious intent. Nowadays, attack from malwares is rising in alarming fashion and thousands of malwares are injected to the Internet. Malware authors use many techniques like obfuscation and packing to avoid detection. A number of techniques for malware detection are available and none of them able to detect all types of malwares. In this paper, a more efficie...
Method configuration (MC) has been presented as a particular kind of method engineering (ME). ME in general is often a tedious and time consuming task and method configuration is no exception. Consequently, tool support is often required. In this paper we present an operationalization of the Method for Method Configuration into the tool support MC Sandbox. The functionality in MC Sandbox emphas...
Motivated by the need for a multi-platform, multipurpose toolkit for sonifying data, the Sonification Sandbox allows users to map data to multiple auditory parameters and add context using a graphical interface. The Sonification Sandbox is a cross-platform application authored in Java, using the Java Sound API to generate MIDI output. The software allows users to independently map several data ...
A series of experiments and related numerical simulations were carried out to study one-dimensional water redistribution processes in an unsaturated soil. A long horizontal Plexiglas box was packed as homogenously as possible with sand. The sandbox was divided into two sections using a very thin metal plate, with one section initially fully saturated and the other section only partially saturat...
A malware is a program that has a malicious intent. Nowadays, attack from malwares is rising in alarming fashion and thousands of malwares are injected to the Internet. Malware authors use many techniques like obfuscation and packing to avoid detection. A number of techniques for malware detection are available and none of them able to detect all types of malwares. In this paper, a more efficie...
We introduce CS50 Sandbox, an environment for secure execution of untrusted code. Implemented as an asynchronous HTTP server, CS50 Sandbox offers clients the ability to execute programs (both interactive and non-interactive) written in any compiled or interpreted language in a tightly controlled, resource-constrained environment. CS50 Sandbox’s HTTP-based API takes files, command lines, and sta...
The execution of malware in an instrumented sandbox is a widespread approach for the analysis of malicious code, largely because it sidesteps the difficulties involved in the static analysis of obfuscated code. As malware analysis sandboxes increase in popularity, they are faced with the problem of malicious code detecting the instrumented environment to evade analysis. In the absence of an “un...
Groundwater pollution by Non-Aqueous Phase Liquids (NAPLs) has become an increasing threat. This article studied the steam injection efficiency in groundwater remediation contaminated with non-aqueous phase liquid (diesel) through a bench-scale laboratory experiment. The experimental set up consists of boiler and sandbox. Steam, which was generated from supplied to sandbox at rate 0.14m3/s, pre...
Information leakage has become a serious problem for computer systems that handle a company’s sensitive information, such as intellectual properties and manufacturing know-how. The majority of the causes can be attributed to loss or theft of information or worms and viruses. As a countermeasure, forbidding the sharing of information through removable media or the Internet is effective, but it a...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید