A survey of binary code similarity

IU Haq, J Caballero - Acm computing surveys (csur), 2021 - dl.acm.org
Binary code similarityapproaches compare two or more pieces of binary code to identify their
similarities and differences. The ability to compare binary code enables many real-world …

[HTML][HTML] Research communities in cyber security: A comprehensive literature review

S Katsikeas, P Johnson, M Ekstedt… - Computer Science …, 2021 - Elsevier
In order to provide a coherent overview of cyber security research, the Scopus academic
abstract and citation database was mined to create a citation graph of 98,373 authors active …

A multi-perspective malware detection approach through behavioral fusion of api call sequence

E Amer, I Zelinka, S El-Sappagh - Computers & Security, 2021 - Elsevier
The widespread development of the malware industry is considered the main threat to our e-
society. Therefore, malware analysis should also be enriched with smart heuristic tools that …

[PDF][PDF] The cyber security body of knowledge

D Basin - University of Bristol, ch. Formal Methods for, 2021 - cybok.org
The CyBOK project would like to understand how the CyBOK is being used and its uptake.
The project would like organisations using, or intending to use, CyBOK for the purposes of …

Saphire: Sandboxing {PHP} applications with tailored system call allowlists

A Bulekov, R Jahanshahi, M Egele - 30th USENIX Security Symposium …, 2021 - usenix.org
Interpreted languages, such as PHP, power a host of platform-independent applications,
including websites, instant messengers, video games, and development environments. With …

[HTML][HTML] A multi-tiered framework for insider threat prevention

RA Alsowail, T Al-Shehari - Electronics, 2021 - mdpi.com
As technologies are rapidly evolving and becoming a crucial part of our lives, security and
privacy issues have been increasing significantly. Public and private organizations have …

{ARCUS}: symbolic root cause analysis of exploits in production systems

C Yagemann, M Pruett, SP Chung, K Bittick… - 30th USENIX Security …, 2021 - usenix.org
End-host runtime monitors (eg, CFI, system call IDS) flag processes in response to
symptoms of a possible attack. Unfortunately, the symptom (eg, invalid control transfer) may …

Automated bug hunting with data-driven symbolic root cause analysis

C Yagemann, SP Chung, B Saltaformaggio… - Proceedings of the 2021 …, 2021 - dl.acm.org
The increasing cost of successful cyberattacks has caused a mindset shift, whereby
defenders now employ proactive defenses, namely software bug hunting, alongside existing …

Negative selection algorithm research and applications in the last decade: A review

KD Gupta, D Dasgupta - IEEE Transactions on Artificial …, 2021 - ieeexplore.ieee.org
The negative selection algorithm (NSA) is one of the important methods in the field of
immunological computation (or artificial immune systems). Over the years, some progress …

Performance evaluation of container-level anomaly-based intrusion detection systems for multi-tenant applications using machine learning algorithms

M Cavalcanti, P Inacio, M Freire - Proceedings of the 16th International …, 2021 - dl.acm.org
The virtualization of computing resources provided by containers has gained increasing
attention and has been widely used in cloud computing. This new demand for container …