Singapore International Arbitration Centre

Displaying 1-5 of 5 results

  • White Papers // Aug 2013

    Computing Immutable Regions for Subspace Top-k Queries

    Given a high-dimensional dataset, a top-k query can be used to shortlist the k tuples that best match the user's preferences. Typically, these preferences regard a subset of the available dimensions (i.e., attributes) whose relative significance is expressed by user-specified weights. Along with the query result, the authors propose to...

    Provided By Singapore International Arbitration Centre

  • White Papers // Apr 2012

    Virtualization Based Password Protection Against Malware In Untrusted Operating Systems

    Password based authentication remains as the mainstream user authentication method for most web servers, despite its known vulnerability to keylogger attacks. Most existing countermeasures are costly because they require a strong isolation of the browser and the operating system. In this paper, the authors propose KGuard, a password input protection...

    Provided By Singapore International Arbitration Centre

  • White Papers // Dec 2011

    deRop: Removing Return-Oriented Programming from Malware

    Over the last few years, malware analysis has been one of the hottest areas in security research. Many techniques and tools have been developed to assist in automatic analysis of malware. This ranges from basic tools like disassemblers and decompilers, to static and dynamic tools that analyze malware behaviors, to...

    Provided By Singapore International Arbitration Centre

  • White Papers // Oct 2009

    Denial-of-Service Attacks on Host-Based Generic Unpackers

    With the advance of packing techniques, a few generic and automatic unpackers have been proposed. These unpackers are designed to automatically unpack packed binaries without specific knowledge of the packing techniques used. In this paper, the authors present an automatic packer with which packed malware forges spurious unpacking behaviors that...

    Provided By Singapore International Arbitration Centre

  • White Papers // Mar 2009

    SS-IDS: Statistical Signature Based IDS

    Security of web servers has become a sensitive subject today. Prediction of normal and abnormal re-quest is problematic due to large number of false alarms in many anomaly based Intrusion Detection Systems (IDS). SS-IDS derive automatically the parameter profiles from the analyzed data thereby generating the Statistical Signatures. Statistical Signatures...

    Provided By Singapore International Arbitration Centre

  • White Papers // Dec 2011

    deRop: Removing Return-Oriented Programming from Malware

    Over the last few years, malware analysis has been one of the hottest areas in security research. Many techniques and tools have been developed to assist in automatic analysis of malware. This ranges from basic tools like disassemblers and decompilers, to static and dynamic tools that analyze malware behaviors, to...

    Provided By Singapore International Arbitration Centre

  • White Papers // Apr 2012

    Virtualization Based Password Protection Against Malware In Untrusted Operating Systems

    Password based authentication remains as the mainstream user authentication method for most web servers, despite its known vulnerability to keylogger attacks. Most existing countermeasures are costly because they require a strong isolation of the browser and the operating system. In this paper, the authors propose KGuard, a password input protection...

    Provided By Singapore International Arbitration Centre

  • White Papers // Mar 2009

    SS-IDS: Statistical Signature Based IDS

    Security of web servers has become a sensitive subject today. Prediction of normal and abnormal re-quest is problematic due to large number of false alarms in many anomaly based Intrusion Detection Systems (IDS). SS-IDS derive automatically the parameter profiles from the analyzed data thereby generating the Statistical Signatures. Statistical Signatures...

    Provided By Singapore International Arbitration Centre

  • White Papers // Oct 2009

    Denial-of-Service Attacks on Host-Based Generic Unpackers

    With the advance of packing techniques, a few generic and automatic unpackers have been proposed. These unpackers are designed to automatically unpack packed binaries without specific knowledge of the packing techniques used. In this paper, the authors present an automatic packer with which packed malware forges spurious unpacking behaviors that...

    Provided By Singapore International Arbitration Centre

  • White Papers // Aug 2013

    Computing Immutable Regions for Subspace Top-k Queries

    Given a high-dimensional dataset, a top-k query can be used to shortlist the k tuples that best match the user's preferences. Typically, these preferences regard a subset of the available dimensions (i.e., attributes) whose relative significance is expressed by user-specified weights. Along with the query result, the authors propose to...

    Provided By Singapore International Arbitration Centre