A Randall, W Hardaker, GM Voelker… - … on Electronic Crime …, 2022 - ieeexplore.ieee.org
Successful malware campaigns often rely on the ability of infected hosts to locate and contact their command-and-control (C2) servers. Malware campaigns often use DNS …
The current landscape of the core Internet technologies shows considerable centralisation with the big tech companies controlling the vast majority of traffic and services. This situation …
Z Huang, J Huang, T Zang - … , PAM 2020, Eugene, Oregon, USA, March 30 …, 2020 - Springer
Recently, as various detection approaches of malicious domains and malware are proposed, the malware which connects to its command and control (C&C) server using …
P Xia, H Wang, Z Yu, X Liu, X Luo, G Xu - arXiv preprint arXiv:2104.05185, 2021 - arxiv.org
DNS has always been criticized for its inherent design flaws, making the system vulnerable to kinds of attacks. Besides, DNS domain names are not fully controlled by the users, which …
P Xia, Z Yu, K Wang, K Ma, S Chen, X Luo… - arXiv preprint arXiv …, 2024 - arxiv.org
The dark web has emerged as the state-of-the-art solution for enhanced anonymity. Just like a double-edged sword, it also inadvertently becomes the safety net and breeding ground for …
A Alam, H Islam, SA Wamim, MT Ahmed, H Siddiqi - 2021 - dspace.bracu.ac.bd
The inherent decentralized nature and peer-to-peer system of the blockchain's popularity has been on the rise in recent times and is being adopted in various innovative applications …
L Böck, N Alexopoulos, E Saracoglu… - … on Electronic Crime …, 2019 - ieeexplore.ieee.org
Time and time again the security community has faced novel threats that were previously never analyzed, sometimes with catastrophic results. To avoid this, proactive analysis of …
B Putz, G Pernul - 2020 IEEE International Conference on …, 2020 - ieeexplore.ieee.org
In many organizations, permissioned blockchain networks are currently transitioning from a proof-of-concept stage to production use. A crucial part of this transition is ensuring …
Different malicious activities occur in cryptocurrency-based permissionless blockchains such as Ethereum and Bitcoin. Some activities are due to the exploitation of vulnerabilities which …