Abstact: Malware has developed and broke through the traditional single concept of program code. It has penetrated into the whole system of society, politics, economy and life. It is impossible to resist malware effectively only relying on anti-virus vendors. The battle against malware requ……
Abstact: The status of malware, similar to that of the living creatures, is the result of the comprehensive elimination and selection. Actually, it is the same with all the software programs. Fundamentally speaking, the theory of evolution is a science on life-death and evolution. Bot……
Abstact: A honeypot is a security resource that can be scanned, attacked and compromised. This presentation systematically summarized the development and status quo of Honeypots, as well the technical challenges researchers face. In the final part, the writer explores the Honeypots’ potentia……
Abstact: This presentation focuses on data storage and security strategies in terms of network identity security. In the beginning, some background about the topic is introduced. Then, the writer summarizes the methods used in cipher text attacks and the current solutions. In the final,……
Abstact: This presentation explores the challenges anti-virus engines, products and systems face. In many cases, the security products are no longer the credible dams when facing with the surging malware waves; they become the trembling islands that are vulnerable sometimes. Time Top……
Abstact: Network virus monitoring has been explored academically and productively. It has now expanded into a new technology with its own direction. The path of virus defense leads us to the world of freedom. This presentation summarizes the virus trends in 2004, introduced the qualities of ……
Abstact: Traditional signature detection technology builds a complete sample database and extracts malware signatures. Static assessment uses an intelligent algorithm to analyze and study known samples, extract signatures and assess unknown samples. This presentation explores related issues ……
Abstact: In this presentation, the writer summarizes the challenges faced by AV principles, introduces the high granularity processing and embeddable AV engine. In the final, the writer makes a conclusion that AV principles are not invariable. Instead, they are evolving dynamic principles. T……
Abstact: Developers hope to extend the anti-virus capabilities of firewalls, IDS and GAP products. Though they can be combined with the file-level detection of traditional antivirus vendors, there are still some problems. This presentation attempts to explore the integration point of network……