2016 4th International Symposium on Digital Forensic and Security (ISDFS)最新文献

筛选
英文 中文
Teaching malware analysis: The design philosophy of a model curriculum 恶意软件分析教学:模型课程的设计理念
2016 4th International Symposium on Digital Forensic and Security (ISDFS) Pub Date : 2016-04-25 DOI: 10.1109/ISDFS.2016.7473529
N. Shashidhar, Peter A. Cooper
{"title":"Teaching malware analysis: The design philosophy of a model curriculum","authors":"N. Shashidhar, Peter A. Cooper","doi":"10.1109/ISDFS.2016.7473529","DOIUrl":"https://doi.org/10.1109/ISDFS.2016.7473529","url":null,"abstract":"The field of malware analysis comprises the art and science of dissecting malicious software using diverse tools and techniques in an effort to comprehend their inner workings so as to mitigate the effects. Clearly, the study and analysis of these tools and techniques fall within the general purview of the broad disciplines of Digital Forensics, Information Assurance, Cyber Security and general principles of Computing Science. In this paper, we explore and discuss the current state of malware analysis courses as they are taught in academic institutions in the U.S. and the world. We contend that there are not very many malware analysis (or closely related) courses being offered in many universities across the U.S. Furthermore, there are several for-profit courses that are taught by online institutions that teach reverse engineering, malware analysis and related topics. Based on our research, we conclude that the domain of malware analysis has effectively been relegated from the academic realm to the domain of the practitioner's skill set. It is this exploration that we are interesting in undertaking in this paper. We then proceed to analyze and review some popular textbooks and online training materials for their soundness and efficacy in teaching the subject to substantiate our above mentioned claims. Finally, we conclude by presenting a model curriculum for this subject based on sound pedagogical ideas and methods.","PeriodicalId":136977,"journal":{"name":"2016 4th International Symposium on Digital Forensic and Security (ISDFS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130830658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Enhancing of biometric authentication with pass strings and cryptographic checksums 利用密码串和校验和增强生物特征认证
2016 4th International Symposium on Digital Forensic and Security (ISDFS) Pub Date : 2016-04-25 DOI: 10.1109/ISDFS.2016.7473538
Veerareddy Vaka, Dale Lindskog, P. Zavarsky
{"title":"Enhancing of biometric authentication with pass strings and cryptographic checksums","authors":"Veerareddy Vaka, Dale Lindskog, P. Zavarsky","doi":"10.1109/ISDFS.2016.7473538","DOIUrl":"https://doi.org/10.1109/ISDFS.2016.7473538","url":null,"abstract":"Summary form only given. Conventional biometric authentication systems store the biometric template or a hash of its digitization, which raises concerns around template privacy and revocability. In this paper, we propose a biometric hash generation scheme, where the normalized biometric template is concatenated with a pass string (PS), e.g. a password or PIN, in order to achieve a robust and secure biometric authentication scheme that overcomes problems around privacy and revocability. The scheme presented here is an improved form of two-factor authentication (2FA) which could enhance biometric authentication in such systems as automated teller machines (ATM), and at same time protect the privacy of biometrics and ease biometric revocability.","PeriodicalId":136977,"journal":{"name":"2016 4th International Symposium on Digital Forensic and Security (ISDFS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132453901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信