Skip to main content

Showing 1–2 of 2 results for author: Deering, T

Searching in archive cs. Search in all archives.
.
  1. arXiv:1504.01693  [pdf, other

    cs.CR cs.HC

    Security Toolbox for Detecting Novel and Sophisticated Android Malware

    Authors: Benjamin Holland, Tom Deering, Suresh Kothari, Jon Mathews, Nikhil Ranade

    Abstract: This paper presents a demo of our Security Toolbox to detect novel malware in Android apps. This Toolbox is developed through our recent research project funded by the DARPA Automated Program Analysis for Cybersecurity (APAC) project. The adversarial challenge ("Red") teams in the DARPA APAC program are tasked with designing sophisticated malware to test the bounds of malware detection technology… ▽ More

    Submitted 7 April, 2015; originally announced April 2015.

    Comments: 4 pages, 1 listing, 2 figures

  2. arXiv:1110.3014  [pdf, ps, other

    cs.DM

    On the Existence of Hamiltonian Paths for History Based Pivot Rules on Acyclic Unique Sink Orientations of Hypercubes

    Authors: Yoshikazu Aoshima, David Avis, Theresa Deering, Yoshitake Matsumoto, Sonoko Moriyama

    Abstract: An acyclic USO on a hypercube is formed by directing its edges in such as way that the digraph is acyclic and each face of the hypercube has a unique sink and a unique source. A path to the global sink of an acyclic USO can be modeled as pivoting in a unit hypercube of the same dimension with an abstract objective function, and vice versa. In such a way, Zadeh's 'least entered rule' and other hist… ▽ More

    Submitted 24 May, 2012; v1 submitted 13 October, 2011; originally announced October 2011.