A Security Game Model for Remote Software Protection
暂无分享,去创建一个
[1] Wenke Lee,et al. McBoost: Boosting Scalability in Malware Collection and Analysis Using Statistical Classification of Executables , 2008, 2008 Annual Computer Security Applications Conference (ACSAC).
[2] Paolo Falcarin,et al. Guest Editors' Introduction: Software Protection , 2011, IEEE Software.
[3] Mariano Ceccato,et al. CodeBender: Remote Software Protection Using Orthogonal Replacement , 2011, IEEE Software.
[4] Elaine Shi,et al. Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems , 2005, SOSP '05.
[5] Sarit Kraus,et al. Game-Theoretic Patrolling with Dynamic Execution Uncertainty and a Case Study on a Real Transit System , 2014, J. Artif. Intell. Res..
[6] Vincent Conitzer,et al. Computing the optimal strategy to commit to , 2006, EC '06.
[7] Martín Abadi,et al. A type system for Java bytecode subroutines , 1999, TOPL.
[8] Branislav Bosanský,et al. Game-theoretic resource allocation for malicious packet detection in computer networks , 2012, AAMAS.
[9] Nicola Basilico,et al. Security Games for Node Localization through Verifiable Multilateration , 2014, IEEE Transactions on Dependable and Secure Computing.
[10] Christian S. Collberg,et al. Distributed application tamper detection via continuous software updates , 2012, ACSAC '12.
[11] L. V. Doorn,et al. SCUBA: Secure Code Update By Attestation in sensor networks , 2006, WiSe '06.
[12] Sarit Kraus,et al. Security in multiagent systems by policy randomization , 2006, AAMAS '06.
[13] Juliane Hahn,et al. Security And Game Theory Algorithms Deployed Systems Lessons Learned , 2016 .
[14] Nicola Basilico,et al. Patrolling security games: Definition and algorithms for solving large instances with single patroller and single intruder , 2012, Artif. Intell..
[15] Yoav Shoham,et al. Multiagent Systems - Algorithmic, Game-Theoretic, and Logical Foundations , 2009 .
[16] Leah H. Jamieson,et al. Establishing the Genuinity of Remote Computer Systems , 2003, USENIX Security Symposium.
[17] Jonathon T. Giffin,et al. Automatic Reverse Engineering of Malware Emulators , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[18] M. M. Flood. THE HIDE AND SEEK GAME OF VON NEUMANN , 1972 .
[19] Lorenzo Martignoni,et al. Conqueror: Tamper-Proof Code Execution on Legacy Systems , 2010, DIMVA.
[20] Pradeep K. Khosla,et al. SWATT: softWare-based attestation for embedded devices , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.