DC Field | Value | Language |
---|---|---|
dc.contributor.author | Schmidt, Thomas C. | - |
dc.contributor.author | Wählisch, Matthias | - |
dc.contributor.author | Jochheim, Benjamin | - |
dc.contributor.author | Gröning, Michael | - |
dc.date.accessioned | 2020-08-26T12:06:43Z | - |
dc.date.available | 2020-08-26T12:06:43Z | - |
dc.date.issued | 2011-07 | - |
dc.identifier.issn | 1931-1222 | en_US |
dc.identifier.uri | http://hdl.handle.net/20.500.12738/2250 | - |
dc.description.abstract | Recent news about various attack vectors document how exploitation techniques are rapidly evolving into the mobile realm. New approaches for detecting attack traces in network traffic are needed for handheld devices that commonly own limited resources, but multiple, heterogeneous network interfaces. In this poster, we report on early results for statistical traffic analysis based on the Shannon Entropy. Unlike previous work, our time-frequency analysis extracts the non-stationary properties of entropy signals. From this context-adaptive technique, we obtain a clear signature of binary instructions and can also detect embedded shellcode. | en |
dc.language.iso | en | en_US |
dc.publisher | Association for Computing Machinery (ACM) | en_US |
dc.relation.ispartof | ACM SIGMOBILE mobile computing and communications review : MCR | en_US |
dc.subject.ddc | 004: Informatik | en_US |
dc.title | WiSec 2011 poster : context-adaptive entropy analysis as a lightweight detector of zero-day shellcode on mobiles | en |
dc.type | Article | en_US |
dc.relation.conference | ACM Conference on Wireless Network Security 2011 | en_US |
tuhh.container.endpage | 48 | en_US |
tuhh.container.issue | 3 | en_US |
tuhh.container.startpage | 47 | en_US |
tuhh.container.volume | 15 | en_US |
tuhh.oai.show | true | en_US |
tuhh.publication.institute | Department Informatik | en_US |
tuhh.publication.institute | Fakultät Technik und Informatik | en_US |
tuhh.publisher.doi | 10.1145/2073290.2073303 | - |
tuhh.type.opus | (wissenschaftlicher) Artikel | - |
dc.type.casrai | Journal Article | - |
dc.type.dini | article | - |
dc.type.driver | article | - |
dc.type.status | info:eu-repo/semantics/publishedVersion | en_US |
dcterms.DCMIType | Text | - |
item.languageiso639-1 | en | - |
item.fulltext | No Fulltext | - |
item.creatorGND | Schmidt, Thomas C. | - |
item.creatorGND | Wählisch, Matthias | - |
item.creatorGND | Jochheim, Benjamin | - |
item.creatorGND | Gröning, Michael | - |
item.openairetype | Article | - |
item.grantfulltext | none | - |
item.creatorOrcid | Schmidt, Thomas C. | - |
item.creatorOrcid | Wählisch, Matthias | - |
item.creatorOrcid | Jochheim, Benjamin | - |
item.creatorOrcid | Gröning, Michael | - |
item.cerifentitytype | Publications | - |
item.openairecristype | http://purl.org/coar/resource_type/c_6501 | - |
crisitem.author.dept | Department Informatik | - |
crisitem.author.orcid | 0000-0002-0956-7885 | - |
crisitem.author.parentorg | Fakultät Technik und Informatik | - |
Appears in Collections: | Publications without full text |
Add Files to Item
Note about this record
Export
Items in REPOSIT are protected by copyright, with all rights reserved, unless otherwise indicated.