Environmental Authentication in Malware.
Jeremy BlackthorneBenjamin KaiserBenjamin FullerBülent YenerPublished in: IACR Cryptol. ePrint Arch. (2017)
Keyphrases
- detect malicious
- biometric authentication
- reverse engineering
- image authentication
- security analysis
- malicious code
- static analysis
- authentication protocol
- user authentication
- malware detection
- control flow
- factor authentication
- data sets
- authentication mechanism
- air pollution
- environmental protection
- identity authentication
- fragile watermarking
- detecting malicious
- drinking water
- keystroke dynamics
- environmental sciences
- biometric data
- air quality
- environmental factors
- socio economic
- object oriented