Fast: Adopting federated unlearning to eliminating malicious terminals at server side

X Guo, P Wang, S Qiu, W Song, Q Zhang… - … on Network Science …, 2023 - ieeexplore.ieee.org
… of malicious clients. One of the advantages of our method is that it operates solely on the
central server side, where the server records the parameter updates of malicious clients. It is not …

Malmax: Multi-aspect execution for automated dynamic web server malware analysis

A Naderi-Afooshteh, Y Kwon, A Nguyen-Tuong… - Proceedings of the …, 2019 - dl.acm.org
… , a novel system to detect serverside malware that routinely … side Malware: This research
focuses on identifying malicious … isolated execution on a predicate or on terminal events (ie, exit …

Cloud terminal: Secure access to sensitive applications from untrusted systems

L Martignoni, P Poosankam, M Zaharia, J Han… - 2012 USENIX Annual …, 2012 - usenix.org
… We propose a new architecture for secure applications, Cloud Terminal, in which the only …
VMs lets one server support hundreds of users. We implement a secure thin terminal that runs …

[PDF][PDF] Mitigating the attacks of malicious terminals

IZ Berta, I VAJDA - PhD dissertaion, 2005 - berta.hu
… If we assume that the terminal is not malicious, the protocol is secure. However, if the terminal
is malicious (either because it is infected by a virus or because it is under the control of an …

Hunting for invisibility: Characterizing and detecting malicious web infrastructures through server visibility analysis

J Zhang, X Hu, J Jang, T Wang, G Gu… - IEEE INFOCOM 2016 …, 2016 - ieeexplore.ieee.org
… At the same time, detecting malicious terminal servers is hindered by their diversities and
various cloaking techniques. However, observations from our measurement study convey a …

Enhancing web browsing security on public terminals using mobile composition

R Sharp, A Madhavapeddy, R Want… - Proceedings of the 6th …, 2008 - dl.acm.org
… web browsers to attackers' websites and maliciously spoof user-input to … terminals (eg
Internet cafes). Worryingly, however, the recent wave of crimeware attacks has involved malicious

Viewpoints: differential string analysis for discovering client-and server-side input validation inconsistencies

M Alkhalaf, SR Choudhary, M Fazzini, T Bultan… - Proceedings of the …, 2012 - dl.acm.org
… behaviors: (1) the server side allows some wrong or malicious data to enter the system,
leading … of an automaton are represented as a Multi-terminal Binary Decision Diagram (MBDD). …

Detecting malicious activities with user‐agent‐based profiles

Y Zhang, H Mekky, ZL Zhang, R Torres… - … Journal of Network …, 2015 - Wiley Online Library
… using the BNF forms with non-terminal terms and terminal terms (tokens). Some examples …
UA-based attacks to a targeted server. If running on the server side, our system can only allow …

Analyzing the Security of OTP 2FA in the Face of Malicious Terminals

AT Mahdad, M Jubur, N Saxena - … 19-21, 2021, Proceedings, Part I 23, 2021 - Springer
… We evaluated the security of OTP-2FA in the malicious program’s presence in the user
terminal and tried to assess if it adds any additional protection in that circumstance. We designed …

Injection Attacks Reloaded: Tunnelling Malicious Payloads over {DNS}

P Jeitner, H Shulman - 30th USENIX Security Symposium (USENIX …, 2021 - usenix.org
… to an authentication server are not validated. We show how to construct malicious payloads
to … By including ANSI terminal escape codes in the CNAME record, an attacker controlling the …