Author image not provided
 Abdulla Alwabel

Authors:
Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article0.43
Citation Count3
Publication count7
Publication years2012-2017
Available for download2
Average downloads per article324.00
Downloads (cumulative)648
Downloads (12 Months)137
Downloads (6 Weeks)33
SEARCH
ROLE
Arrow RightAuthor only


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


7 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 7 of 7
Sort by:

1 published by ACM
December 2017 ACM Transactions on Privacy and Security (TOPS): Volume 21 Issue 1, January 2018
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 28,   Downloads (12 Months): 44,   Downloads (Overall): 44

Full text available: PDFPDF
Malware analysis relies heavily on the use of virtual machines (VMs) for functionality and safety. There are subtle differences in operation between virtual and physical machines. Contemporary malware checks for these differences and changes its behavior when it detects a VM presence. These anti-VM techniques hinder malware analysis. Existing research ...
Keywords: assembly, virtual machine testing, reverse engineering, System security

2
August 2014 SEC'14: Proceedings of the 23rd USENIX conference on Security Symposium
Publisher: USENIX Association
Bibliometrics:
Citation Count: 1

Malware analysis relies heavily on the use of virtual machines for functionality and safety. There are subtle differences in operation between virtual machines and physical machines. Contemporary malware checks for these differences to detect that it is being run in a virtual machine, and modifies its behavior to thwart being ...

3
August 2014 CSET'14: Proceedings of the 7th USENIX conference on Cyber Security Experimentation and Test
Publisher: USENIX Association
Bibliometrics:
Citation Count: 2

In this paper, we advocate for publicly accessible live malware experimentation testbeds. We introduce new advancements for high-fidelity transparent emulation and fine-grain automatic containment that make such experimentation safe and useful to researchers, and we propose a complete, extensible live-malware experimentation framework. Our framework, aided by our new technologies, facilitates ...

4 published by ACM
August 2014 SIGCOMM '14: Proceedings of the 2014 ACM conference on SIGCOMM
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 5,   Downloads (12 Months): 93,   Downloads (Overall): 604

Full text available: PDFPDF
We propose a new software-defined security service -- SENSS -- that enables a victim network to request services from remote ISPs for traffic that carries source IPs or destination IPs from this network's address space. These services range from statistics gathering, to filtering or quality of service guarantees, to route ...
Keywords: design, privacy, security, SDN, management
Also published in:
February 2015  ACM SIGCOMM Computer Communication Review - SIGCOMM'14: Volume 44 Issue 4, October 2014

5
August 2012 CSET'12: Proceedings of the 5th USENIX conference on Cyber Security Experimentation and Test
Publisher: USENIX Association
Bibliometrics:
Citation Count: 0

Many network testbeds today allow users to create their own disk images as a way of saving experimental state between allocations. We examine the effect of this practice on testbed operations. We find that disk imaging is very popular among both research and class users. Excessive disk image creation makes ...

6
July 2012 EPEW'12: Proceedings of the 9th European conference on Computer Performance Engineering
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 0

Volunteer cloud computing is a new type of clouds aiming at moving volunteer computing towards the cloud. The new cloud type is motivated by the fact that building a cloud out of non-dedicated resources can be useful for scientific projects which cannot afford the cost of consumption of cloud services ...

7
July 2012 EPEW'12: Proceedings of the 9th European conference on Computer Performance Engineering
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 0

Volunteer cloud computing is a new type of clouds aiming at moving volunteer computing towards the cloud. The new cloud type is motivated by the fact that building a cloud out of non-dedicated resources can be useful for scientific projects which cannot afford the cost of consumption of cloud services ...



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us