DC ElementWertSprache
dc.contributor.authorSchmidt, Thomas C.-
dc.contributor.authorWählisch, Matthias-
dc.contributor.authorJochheim, Benjamin-
dc.contributor.authorGröning, Michael-
dc.date.accessioned2020-08-26T12:06:43Z-
dc.date.available2020-08-26T12:06:43Z-
dc.date.issued2011-07-
dc.identifier.issn1931-1222en_US
dc.identifier.urihttp://hdl.handle.net/20.500.12738/2250-
dc.description.abstractRecent news about various attack vectors document how exploitation techniques are rapidly evolving into the mobile realm. New approaches for detecting attack traces in network traffic are needed for handheld devices that commonly own limited resources, but multiple, heterogeneous network interfaces. In this poster, we report on early results for statistical traffic analysis based on the Shannon Entropy. Unlike previous work, our time-frequency analysis extracts the non-stationary properties of entropy signals. From this context-adaptive technique, we obtain a clear signature of binary instructions and can also detect embedded shellcode.en
dc.language.isoenen_US
dc.publisherAssociation for Computing Machinery (ACM)en_US
dc.relation.ispartofACM SIGMOBILE mobile computing and communications review : MCRen_US
dc.subject.ddc004: Informatiken_US
dc.titleWiSec 2011 poster : context-adaptive entropy analysis as a lightweight detector of zero-day shellcode on mobilesen
dc.typeArticleen_US
dc.relation.conferenceACM Conference on Wireless Network Security 2011en_US
tuhh.container.endpage48en_US
tuhh.container.issue3en_US
tuhh.container.startpage47en_US
tuhh.container.volume15en_US
tuhh.oai.showtrueen_US
tuhh.publication.instituteDepartment Informatiken_US
tuhh.publication.instituteFakultät Technik und Informatiken_US
tuhh.publisher.doi10.1145/2073290.2073303-
tuhh.type.opus(wissenschaftlicher) Artikel-
dc.type.casraiJournal Article-
dc.type.diniarticle-
dc.type.driverarticle-
dc.type.statusinfo:eu-repo/semantics/publishedVersionen_US
dcterms.DCMITypeText-
item.languageiso639-1en-
item.fulltextNo Fulltext-
item.creatorGNDSchmidt, Thomas C.-
item.creatorGNDWählisch, Matthias-
item.creatorGNDJochheim, Benjamin-
item.creatorGNDGröning, Michael-
item.openairetypeArticle-
item.grantfulltextnone-
item.creatorOrcidSchmidt, Thomas C.-
item.creatorOrcidWählisch, Matthias-
item.creatorOrcidJochheim, Benjamin-
item.creatorOrcidGröning, Michael-
item.cerifentitytypePublications-
item.openairecristypehttp://purl.org/coar/resource_type/c_6501-
crisitem.author.deptDepartment Informatik-
crisitem.author.orcid0000-0002-0956-7885-
crisitem.author.parentorgFakultät Technik und Informatik-
Enthalten in den Sammlungen:Publications without full text
Zur Kurzanzeige

Seitenansichten

49
checked on 14.01.2025

Google ScholarTM

Prüfe

HAW Katalog

Prüfe

Volltext ergänzen

Feedback zu diesem Datensatz


Alle Ressourcen in diesem Repository sind urheberrechtlich geschützt.