This preview shows pages 1–2. Sign up to view the full content.
This preview has intentionally blurred sections. Sign up to view the full version.View Full Document
Unformatted text preview: Antivirus (AV) vulnerabilities o severe vulnerabilities in AV o see slide 3 o Question: Observation? o Future research: Why some are more vulnerable than the others? o Question: What is the implication? Topic 2: Basic Ideas From Host-Based to Server-based o How to implement? In-cloud detection o Pros of in-cloud detection ?-No update. -Reduce cost. -Lightweight host N-Version protection o Multiple detection engines o N-version programming o Parallel computing Environment o Networks -Enterprise (good connectivities) 1 2-Government (highly controlled) -Mobile (lightweight) o Problems: -Privacy -Network traffic...
View Full Document
This note was uploaded on 12/07/2011 for the course COMP 7370 taught by Professor Qin,x during the Summer '08 term at Auburn University.
- Summer '08