Por favor, use este identificador para citar o enlazar este ítem:
http://redi.ufasta.edu.ar:8082/jspui/handle/123456789/1597
Registro completo de metadatos
Campo DC | Valor | Lengua/Idioma |
---|---|---|
dc.creator | Ruiz de Angeli, Gonzalo | - |
dc.creator | Alberdi, Juan Ignacio | - |
dc.creator | Constanzo, Bruno | - |
dc.creator | Curti, Hugo | - |
dc.creator | Di Iorio, Ana Haydée | - |
dc.date | 2017 | - |
dc.date.accessioned | 2018-03-08T21:30:14Z | - |
dc.date.accessioned | 2021-11-26T18:38:56Z | - |
dc.date.available | 2018-03-08T21:30:14Z | - |
dc.date.available | 2021-11-26T18:38:56Z | - |
dc.date.issued | 2017 | - |
dc.identifier.uri | http://redi.ufasta.edu.ar:8082/jspui/handle/123456789/1597 | - |
dc.description | In the present world of information and interconnection, malware is a latent threat. Just speaking of “ill-intended software” gives a too broad definition: malware has evolved and taken different forms through the years. It is necessary to know and understand the traces that remain in a computer system after an infection. For years the information security community has focused on live analysis and response against these threats, so there is a huge opportunity to adapt and make post-mortem, host-based signatures. In this work, some features that may work as malware signatures for digital forensics experts are proposed. | es_ES |
dc.description | Fil: Ruiz de Angeli, Gonzalo. Universidad FASTA; Argentina. | - |
dc.description | Fil: Alberdi, Juan Ignacio. Universidad FASTA; Argentina. | - |
dc.description | Fil: Constanzo, Bruno. Universidad FASTA; Argentina. | - |
dc.description | Fil: Curti, Hugo. Universidad FASTA; Argentina. | - |
dc.description | Fil: Di Iorio, Ana Haydée. Universidad FASTA; Argentina. | - |
dc.format | application/pdf | es_ES |
dc.language | spa | es_ES |
dc.publisher | IX Congreso Iberoamericano de Seguridad Informática. CIBSI 2017 | es_ES |
dc.rights | info:eu-repo/semantics/openAccess | es_ES |
dc.rights | http://creativecommons.org/licenses/by-nc-nd/3.0/deed.es_AR | es_ES |
dc.source | instname:Universidad FASTA | es_ES |
dc.source | reponame:REDI | es_ES |
dc.subject | Host-based signatures | es_ES |
dc.subject | Malware | es_ES |
dc.subject | Informática forense | es_ES |
dc.subject | DFIR | es_ES |
dc.subject | Windows registry | es_ES |
dc.subject | DLLs | es_ES |
dc.subject | Portable executable | es_ES |
dc.title | Windows malware: traces in the host | es_ES |
dc.type | info:eurepo/semantics/conferenceObject | es_ES |
dc.type | info:ar-repo/semantics/documento de conferencia | es_ES |
dc.type | info:eu-repo/semantics/submittedVersion | - |
Aparece en las colecciones: | Facultad de Ingeniería - G.I - Sistemas Operativos - Informática Forense |
Ficheros en este ítem:
Fichero | Descripción | Tamaño | Formato | |
---|---|---|---|---|
CIBSI-TIBETS-17_paper.pdf | 815,42 kB | Adobe PDF | Visualizar/Abrir |
Los ítems de DSpace están protegidos por copyright, con todos los derechos reservados, a menos que se indique lo contrario.