modusoperandi.csc.ncsu.edu
ModusOperandi:The Modus Operandi Project
http://modusoperandi.csc.ncsu.edu/index.shtml
The goal of the modus operandi. Project is to identify software based on some of its essential characteristics. These characteristics are determined by automated inspection of previous versions of the software. New versions may have distinctly different code, but we believe will retain these essential characteristics if they are to accomplish the same function as in previous versions. Methods of both static and dynamic analysis are useful for this purpose. Hence, the name modus operandi.
modusoperandi.csc.ncsu.edu
ModusOperandi:Papers
http://modusoperandi.csc.ncsu.edu/papers.shtml
Q Zhang, D. S. Reeves, P. Ning, and S. P. Iyer, "Analyzing Network Traffic to Detect Self-Decrypting Exploit Code", in Proc. of the ACM Symposium on Information, Computer, and Communications Security (ASIACCS 2007). March 2007, Singapore. [ Publisher's website. Q Zhang and D. S. Reeves, "MetaAware: Identifying Metamorphic Malware", in Proc. of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), December 2007, IEEE Computer Society, pp. 411-420. [ Publisher's website. Y Park, Q. Zh...
modusoperandi.csc.ncsu.edu
ModusOperandi:Software
http://modusoperandi.csc.ncsu.edu/software.shtml
Software created as part of the modus operandi. Project may be made available. Contact us. If you are interested. Douglas S. Reeves. Department of Computer Science. Last modified on Thursday, 04-Oct-2012 14:20:38 EDT. Send comments to: web page maintainer.
footfall.csc.ncsu.edu
FootFall: Members of the Team
http://footfall.csc.ncsu.edu/team.htm
The following individuals are from NC State University. Douglas S. Reeves. Also participating is the following from George Mason University. The program manager for the ARDA Advanced IC Infosec program is Richard Brackney, and for DTO is Carl Landwehr. Our project manager is Kim Morgenstern of the Department of Defense, and our technical project monitor is Michael Oehler, also of DoD. Our contract monitors are Gloria Golden and Tom Svoboda of the National Business Center.
rtcomm.csc.ncsu.edu
Resource Allocation
http://rtcomm.csc.ncsu.edu/resalloc.htm
The Real-Time Communication Project. Quality of service is provided by ensuring that adequate buffer space, bandwidth, CPU time, etc. are allocated to the user's application. Simulator for dynamic resource allocation, by Errin W. Fulp. This application simulates a network node with a finite capacity buffer and adjustable rate server. The simulator implements one of two different dynamic bandwidth allocation algorithms to adjust resources so to provide a desired cell loss probability. Congestion Pricing F...
modusoperandi.csc.ncsu.edu
ModusOperandi:Participants
http://modusoperandi.csc.ncsu.edu/participants.shtml
Douglas S. Reeves. Qinghua Zhang, previously at N.C. State University, now at Google. Previously at N.C. State University, now at Columbia University. Vikram Mulukutla, previously at N.C. State University, now at QualComm. Douglas S. Reeves. Department of Computer Science. Last modified on Thursday, 04-Oct-2012 14:20:38 EDT. Send comments to: web page maintainer.
modusoperandi.csc.ncsu.edu
ModusOperandi:Theses and Dissertations
http://modusoperandi.csc.ncsu.edu/theses.shtml
Network and Host Based Countermeasures against Large-scale Networked Compromised Systems or Malicious Software", Younghee Park, July 2010, Doctor of Philosophy in Computer Science. [ N.C. State Library. Wolfsting: Extending Online Dynamic Malware Analysis Systems by Engaging Malware", Vikram Mulukutla, June 2010, Master of Science in Computer Science. [ N.C. State Library. Douglas S. Reeves. Department of Computer Science. Last modified on Thursday, 04-Oct-2012 14:20:43 EDT.