University of Genova

Displaying 1-11 of 11 results

  • White Papers // Dec 2012

    PE-Header-Based Malware Study and Detection

    In this paper, the author present a simple and faster approach to distinguish between malware and legitimate .exe files by simply looking at properties of the MS Windows Portable Executable (PE) headers. They extract distinguishing features from the PEheaders using the structural information standardized by the Microsoft Windows operating system...

    Provided By University of Genova

  • White Papers // Jun 2012

    From Throw-Away Traffic to Bots: Detecting the Rise of DGA-Based Malware

    Many botnet detection systems employ a blacklist of known Command and Control (C&C) domains to detect bots and block their traffic. Similar to signature-based virus detection, such a botnet detection approach is static because the blacklist is updated only after running an external (and often manual) process of domain discovery....

    Provided By University of Genova

  • White Papers // Aug 2011

    Parameterized Verification of Safety Properties in Ad Hoc Network Protocols

    The authors summarize the main results proved in recent work on the parameterized verification of safety properties for ad hoc network protocols. They consider a model in which the communication topology of a network is represented as a graph. Nodes represent states of individual processes. Adjacent nodes represent single-hop neighbors....

    Provided By University of Genova

  • White Papers // Apr 2011

    A Transmit Beamforming Technique for Mimo Cognitive Radios

    In the present paper one of the main problems of cognitive radios, that is how to allow the secondary (cognitive) users to exploit the unused resources by primary users, is faced by introducing multiple antennas at the cognitive terminals. Under the assumption of perfect Channel State Information (CSI), a transmit...

    Provided By University of Genova

  • White Papers // Jan 2011

    Interaction Modeling in Automotive Applications: A Cognitive Approach

    In the last decade, the design of smart tools applied to the automotive sector is becoming more and more required to support driving tasks and to increase drivers' safety. In this paper, a system for the joint analysis of the on board/off board vehicle context is proposed to derive considerations...

    Provided By University of Genova

  • White Papers // Apr 2010

    A Comparison Among Cooperative Spectrum Sensing Approaches for Cognitive Radios

    In this paper, a comparison among different cooperative spectrum sensing approaches is provided. It is assumed that the secondary terminals autonomously perform local spectrum sensing and forward their decision to a fusion center. It combines the received data to obtain the global decision, i.e. the presence or the absence of...

    Provided By University of Genova

  • White Papers // Jul 2009

    A Measurement Study of Web Redirections in the Internet

    The use of URL redirections has been recently studied to filter spam as email and web spammers use redirection to camouflage their web pages. However, many web sites also employ redirection for legitimate reasons such as logging, localization, and load-balancing. While a majority of the studies on URL redirection focused...

    Provided By University of Genova

  • White Papers // Jun 2009

    Managing Configuration Complexity During Deployment and Maintenance of SOA Solutions

    Successful deployment and maintenance of enterprise SOA solutions involves configuring and managing several middleware software stacks. These middleware stacks have several hundreds to thousands of configuration attributes to be configured and managed. Ineffective Management of configuration information increases the cost, labor and time of troubleshooting configuration problems. The reason for...

    Provided By University of Genova

  • White Papers // Apr 2009

    A Comparison Between Stand-Alone and Distributed Architectures for Spectrum Hole Detection

    In this paper two different cognitive radio architectures, i.e. stand-alone and distributed, are proposed for spectrum sensing purposes. In particular, both architectures implement a fast and reliable algorithm based on cyclic features extraction which allows identifying spectrum holes. The performances of such systems are compared in detecting primary users' presence...

    Provided By University of Genova

  • White Papers // Jan 2009

    OFDM Recognition Based on Cyclostationary Analysis in an Open Spectrum Scenario

    In this paper the problem of detecting the presence of similar OFDM signals, i.e. WLAN and WiMAX signals, in an Open Spectrum scenario is faced. The identification of the channel occupancy and the signal classification are performed by using a fast detector based on a single spectral correlation function estimator...

    Provided By University of Genova

  • White Papers // Dec 2008

    Per Flow Packet Sampling for High-Speed Network Monitoring

    This paper presents a per-flow packet sampling method that enables the real-time classification of high-speed network traffic. The method, based upon the partial sampling of each flow (i.e., performing sampling at only early stages in each flow's lifetime), provides a sufficient reduction in total traffic (e.g., a factor of five...

    Provided By University of Genova

  • White Papers // Jan 2009

    OFDM Recognition Based on Cyclostationary Analysis in an Open Spectrum Scenario

    In this paper the problem of detecting the presence of similar OFDM signals, i.e. WLAN and WiMAX signals, in an Open Spectrum scenario is faced. The identification of the channel occupancy and the signal classification are performed by using a fast detector based on a single spectral correlation function estimator...

    Provided By University of Genova

  • White Papers // Dec 2008

    Per Flow Packet Sampling for High-Speed Network Monitoring

    This paper presents a per-flow packet sampling method that enables the real-time classification of high-speed network traffic. The method, based upon the partial sampling of each flow (i.e., performing sampling at only early stages in each flow's lifetime), provides a sufficient reduction in total traffic (e.g., a factor of five...

    Provided By University of Genova

  • White Papers // Apr 2009

    A Comparison Between Stand-Alone and Distributed Architectures for Spectrum Hole Detection

    In this paper two different cognitive radio architectures, i.e. stand-alone and distributed, are proposed for spectrum sensing purposes. In particular, both architectures implement a fast and reliable algorithm based on cyclic features extraction which allows identifying spectrum holes. The performances of such systems are compared in detecting primary users' presence...

    Provided By University of Genova

  • White Papers // Apr 2010

    A Comparison Among Cooperative Spectrum Sensing Approaches for Cognitive Radios

    In this paper, a comparison among different cooperative spectrum sensing approaches is provided. It is assumed that the secondary terminals autonomously perform local spectrum sensing and forward their decision to a fusion center. It combines the received data to obtain the global decision, i.e. the presence or the absence of...

    Provided By University of Genova

  • White Papers // Apr 2011

    A Transmit Beamforming Technique for Mimo Cognitive Radios

    In the present paper one of the main problems of cognitive radios, that is how to allow the secondary (cognitive) users to exploit the unused resources by primary users, is faced by introducing multiple antennas at the cognitive terminals. Under the assumption of perfect Channel State Information (CSI), a transmit...

    Provided By University of Genova

  • White Papers // Jan 2011

    Interaction Modeling in Automotive Applications: A Cognitive Approach

    In the last decade, the design of smart tools applied to the automotive sector is becoming more and more required to support driving tasks and to increase drivers' safety. In this paper, a system for the joint analysis of the on board/off board vehicle context is proposed to derive considerations...

    Provided By University of Genova

  • White Papers // Aug 2011

    Parameterized Verification of Safety Properties in Ad Hoc Network Protocols

    The authors summarize the main results proved in recent work on the parameterized verification of safety properties for ad hoc network protocols. They consider a model in which the communication topology of a network is represented as a graph. Nodes represent states of individual processes. Adjacent nodes represent single-hop neighbors....

    Provided By University of Genova

  • White Papers // Jun 2012

    From Throw-Away Traffic to Bots: Detecting the Rise of DGA-Based Malware

    Many botnet detection systems employ a blacklist of known Command and Control (C&C) domains to detect bots and block their traffic. Similar to signature-based virus detection, such a botnet detection approach is static because the blacklist is updated only after running an external (and often manual) process of domain discovery....

    Provided By University of Genova

  • White Papers // Dec 2012

    PE-Header-Based Malware Study and Detection

    In this paper, the author present a simple and faster approach to distinguish between malware and legitimate .exe files by simply looking at properties of the MS Windows Portable Executable (PE) headers. They extract distinguishing features from the PEheaders using the structural information standardized by the Microsoft Windows operating system...

    Provided By University of Genova

  • White Papers // Jun 2009

    Managing Configuration Complexity During Deployment and Maintenance of SOA Solutions

    Successful deployment and maintenance of enterprise SOA solutions involves configuring and managing several middleware software stacks. These middleware stacks have several hundreds to thousands of configuration attributes to be configured and managed. Ineffective Management of configuration information increases the cost, labor and time of troubleshooting configuration problems. The reason for...

    Provided By University of Genova

  • White Papers // Jul 2009

    A Measurement Study of Web Redirections in the Internet

    The use of URL redirections has been recently studied to filter spam as email and web spammers use redirection to camouflage their web pages. However, many web sites also employ redirection for legitimate reasons such as logging, localization, and load-balancing. While a majority of the studies on URL redirection focused...

    Provided By University of Genova