Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

defence capability

biblio

Visible to the public Using Dynamic Taint Approach for Malware Threat

Submitted by grigby1 on Tue, 03/07/2017 - 1:40pm
  • pubcrawl170109
  • Information Flow
  • intersuspicious modules
  • invasive software
  • malware
  • Malware behavioural analysis
  • malware infection
  • malware threat analysis
  • network threats
  • FSM
  • Servers
  • suspicious apps
  • taint checking tools
  • taint marking
  • threat analysis
  • trees (mathematics)
  • weighted spanning tree analysis scheme
  • Computer hacking
  • Android programs
  • attack sequence
  • behavioural analysis
  • cloud applications
  • Cloud Computing
  • cloud computing server
  • Computational modeling
  • Computer crime
  • Analytical models
  • cyber security attack
  • data tracking
  • defence capability
  • Dynamic taint propagation
  • dynamic taint propagation analysis model
  • finite state machine
  • finite state machines

Terms of Use  |  ©2023. CPS-VO