Code signing

Known as: Driver signing, Unsigned code, Authenticode 
Code signing is the process of digitally signing executables and scripts to confirm the software author and guarantee that the code has not been… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Digitally signed malware can bypass system protection mechanisms that install or launch only programs with valid signatures. It… (More)
  • figure 1
  • figure 3
  • table 1
  • table 2
  • table 3
Is this relevant?
2015
2015
Code signing is a solution to verify the integrity of software and its publisher's identity, but it can be abused by malware and… (More)
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • table 2
Is this relevant?
2011
2011
Over the last two decades, privacy has been fading away. Some people have even stated: You have zero privacy – get over it! As… (More)
Is this relevant?
Highly Cited
2008
Highly Cited
2008
The goal of this work is to detect hand and arm positions over continuous sign language video sequences of more than one hour in… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 6
Is this relevant?
2008
2008
Composition theorems in simulation-based approaches allow to build complex protocols from sub-protocols in a modular way. However… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2006
Highly Cited
2006
This paper focuses on network traffic measurement of Peer-to- Peer (P2P) applications on the Internet. P2P applications… (More)
  • figure 2
  • figure 1
  • figure 3
  • figure 5
  • figure 4
Is this relevant?
Highly Cited
2005
Highly Cited
2005
An accurate mapping of traffic to applications is important for a broad range of network management and measurement tasks… (More)
  • table 1
  • table 2
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2004
Highly Cited
2004
The ability to accurately identify the network traffic associated with different P2P applications is important to a broad range… (More)
  • table 1
  • figure 1
  • table 2
  • table 3
  • table 4
Is this relevant?
Highly Cited
2001
Highly Cited
2001
Motivated by emerging needs in online interactions, we define a new type of digital signature called a ‘Content Extraction… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2001
Highly Cited
2001
The Internet and the growing availability of inexpensive yet powerful commodity hardware has changed our view of computing… (More)
  • figure 2
  • figure 1
  • table 1
  • figure 6
  • figure 5
Is this relevant?