University of Louisiana

Displaying 1-12 of 12 results

  • White Papers // Sep 2012

    Tracking Concept Drift in Malware Families

    The previous efforts in the use of machine learning for malware detection have assumed that malware population is stationary i.e. probability distribution of the observed characteristics (features) of malware populations don't change over time. In this paper, the authors investigate this assumption for malware families as populations. Malware, by design,...

    Provided By University of Louisiana

  • White Papers // Apr 2011

    Incentive-Aware Data Dissemination in Delay-Tolerant Mobile Networks

    This paper centers on data dissemination in delay-tolerant mobile networks, where data fall into a range of interest types and each node may have one or multiple interests. The goal is to deliver data messages from sources to nodes with corresponding interests. The authors consider selfish nodes with rational behavior,...

    Provided By University of Louisiana

  • White Papers // Sep 2010

    Header Information in Malware Families and Impact on Automated Classifiers

    The metadata embedded in program executables provides information that can be useful for automated malware detection or classification. With potentially tens of thousands of variants per malware family, it is unclear how much consistency there is in the metadata, and whether different families exhibit different consistencies. Header information from multiple...

    Provided By University of Louisiana

  • White Papers // Sep 2010

    Malware Antimalware Games

    Game theory has been used to model several areas of information security like network security, intrusion detection, information warfare and security investment. The authors first survey the game theoretical approaches in these areas of information security. They then explore the role of game theory in modeling an area of information...

    Provided By University of Louisiana

  • White Papers // Aug 2009

    Should Goldman Sachs And Morgan Stanley Try To Get Half Price On The TARP Warrants?

    The cancellation provisions in the Troubled Asset Relief Program (TARP) warrant agreements loom large for the investment banks Goldman Sachs and Morgan Stanley in the summer of 2009. These banks could gain hundreds of millions of dollars by issuing equity to satisfy the cancellation provisions of the TARP warrant agreements....

    Provided By University of Louisiana

  • White Papers // May 2009

    On Optimal AV System Strategies Against Obfuscated Malware

    Many Anti-Virus (AV) Systems are heterogeneous compositions of components, with each component specially tuned to work on a certain class of threat. Each component may have individually tunable parameters and different performance characteristics. No general theory is known for composing such components and assigning their individual parameters in order to...

    Provided By University of Louisiana

  • White Papers // Apr 2009

    Hashing Round-Down Prefixes for Rapid Packet Classification

    Packet classification is complex due to multiple fields present in each filter rule, easily manifesting itself as a router performance bottleneck. Most known classification approaches involve either hardware support or optimization steps. Unfortunately, an approach with hardware support is expensive and has limited scalability, whereas one with optimization fails to...

    Provided By University of Louisiana

  • White Papers // Nov 2008

    A SelfLearning AV Scanner

    The nonzero "Response Time" of AV technologies offers a lacuna for hackers to exploit. By the time an AV company responds with a signature to detect a malicious sample, a hacker may release thousands of new variants. The authors present a self-learning AV scanner that effectively zeroes the response time...

    Provided By University of Louisiana

  • White Papers // Aug 2008

    Constructing Malware Normalizers Using Term Rewriting

    A malware mutation engine is able to transform a malicious program to create a different version of the program. Such mutation engines are used at distribution sites or in self-propagating malware in order to create variation in the distributed programs. Program normalization is a way to remove variety introduced by...

    Provided By University of Louisiana

  • White Papers // Jul 2008

    Evaluation of Malware Phylogeny Modelling Systems Using Automated Variant Generation

    A malware phylogeny model is an estimation of the derivation relationships between a set of malware samples. Systems that construct phylogeny models are expected to be useful for malware analysts. While several such systems have been proposed, little is about the consistency of their results on different data sets, about...

    Provided By University of Louisiana

  • White Papers // Apr 2008

    Ultraperformance Wireless Interconnect Nanonetworks for Heterogeneous Gigascale Multi-Processor SoCs

    To bridge the widening gap between computation requirements and communication efficiency faced by gigascale heterogeneous multi-processor SoCs in the upcoming billion-transistor era, a new on-chip communication system, dubbed Wireless Network-on-Chip (WNoC), is proposed by using the recently developed RF interconnection. With the uniqueness of wireless interconnection, the WNoC design paradigm...

    Provided By University of Louisiana

  • White Papers // Feb 2007

    Exploiting Similarity Between Variants to Defeat Malware

    Many malicious programs are just previously seen programs that have had some minor changes made to them. A slightly different variant hardly qualifies as a stealth attack: being 99% the same as a known piece of malware should be a dead give-away. This paper describes a method for searching database...

    Provided By University of Louisiana

  • White Papers // Aug 2009

    Should Goldman Sachs And Morgan Stanley Try To Get Half Price On The TARP Warrants?

    The cancellation provisions in the Troubled Asset Relief Program (TARP) warrant agreements loom large for the investment banks Goldman Sachs and Morgan Stanley in the summer of 2009. These banks could gain hundreds of millions of dollars by issuing equity to satisfy the cancellation provisions of the TARP warrant agreements....

    Provided By University of Louisiana

  • White Papers // Nov 2008

    A SelfLearning AV Scanner

    The nonzero "Response Time" of AV technologies offers a lacuna for hackers to exploit. By the time an AV company responds with a signature to detect a malicious sample, a hacker may release thousands of new variants. The authors present a self-learning AV scanner that effectively zeroes the response time...

    Provided By University of Louisiana

  • White Papers // May 2009

    On Optimal AV System Strategies Against Obfuscated Malware

    Many Anti-Virus (AV) Systems are heterogeneous compositions of components, with each component specially tuned to work on a certain class of threat. Each component may have individually tunable parameters and different performance characteristics. No general theory is known for composing such components and assigning their individual parameters in order to...

    Provided By University of Louisiana

  • White Papers // Apr 2011

    Incentive-Aware Data Dissemination in Delay-Tolerant Mobile Networks

    This paper centers on data dissemination in delay-tolerant mobile networks, where data fall into a range of interest types and each node may have one or multiple interests. The goal is to deliver data messages from sources to nodes with corresponding interests. The authors consider selfish nodes with rational behavior,...

    Provided By University of Louisiana

  • White Papers // Sep 2010

    Malware Antimalware Games

    Game theory has been used to model several areas of information security like network security, intrusion detection, information warfare and security investment. The authors first survey the game theoretical approaches in these areas of information security. They then explore the role of game theory in modeling an area of information...

    Provided By University of Louisiana

  • White Papers // Sep 2010

    Header Information in Malware Families and Impact on Automated Classifiers

    The metadata embedded in program executables provides information that can be useful for automated malware detection or classification. With potentially tens of thousands of variants per malware family, it is unclear how much consistency there is in the metadata, and whether different families exhibit different consistencies. Header information from multiple...

    Provided By University of Louisiana

  • White Papers // Feb 2007

    Exploiting Similarity Between Variants to Defeat Malware

    Many malicious programs are just previously seen programs that have had some minor changes made to them. A slightly different variant hardly qualifies as a stealth attack: being 99% the same as a known piece of malware should be a dead give-away. This paper describes a method for searching database...

    Provided By University of Louisiana

  • White Papers // Jul 2008

    Evaluation of Malware Phylogeny Modelling Systems Using Automated Variant Generation

    A malware phylogeny model is an estimation of the derivation relationships between a set of malware samples. Systems that construct phylogeny models are expected to be useful for malware analysts. While several such systems have been proposed, little is about the consistency of their results on different data sets, about...

    Provided By University of Louisiana

  • White Papers // Aug 2008

    Constructing Malware Normalizers Using Term Rewriting

    A malware mutation engine is able to transform a malicious program to create a different version of the program. Such mutation engines are used at distribution sites or in self-propagating malware in order to create variation in the distributed programs. Program normalization is a way to remove variety introduced by...

    Provided By University of Louisiana

  • White Papers // Apr 2009

    Hashing Round-Down Prefixes for Rapid Packet Classification

    Packet classification is complex due to multiple fields present in each filter rule, easily manifesting itself as a router performance bottleneck. Most known classification approaches involve either hardware support or optimization steps. Unfortunately, an approach with hardware support is expensive and has limited scalability, whereas one with optimization fails to...

    Provided By University of Louisiana

  • White Papers // Sep 2012

    Tracking Concept Drift in Malware Families

    The previous efforts in the use of machine learning for malware detection have assumed that malware population is stationary i.e. probability distribution of the observed characteristics (features) of malware populations don't change over time. In this paper, the authors investigate this assumption for malware families as populations. Malware, by design,...

    Provided By University of Louisiana

  • White Papers // Apr 2008

    Ultraperformance Wireless Interconnect Nanonetworks for Heterogeneous Gigascale Multi-Processor SoCs

    To bridge the widening gap between computation requirements and communication efficiency faced by gigascale heterogeneous multi-processor SoCs in the upcoming billion-transistor era, a new on-chip communication system, dubbed Wireless Network-on-Chip (WNoC), is proposed by using the recently developed RF interconnection. With the uniqueness of wireless interconnection, the WNoC design paradigm...

    Provided By University of Louisiana