Data preprocessing for anomaly based network intrusion detection: A review

JJ Davis, AJ Clark - computers & security, 2011 - Elsevier
Data preprocessing is widely recognized as an important stage in anomaly detection. This
paper reviews the data preprocessing techniques used by anomaly-based network intrusion …

Protecting software through obfuscation: Can it keep pace with progress in code analysis?

S Schrittwieser, S Katzenbeisser, J Kinder… - Acm computing surveys …, 2016 - dl.acm.org
Software obfuscation has always been a controversially discussed research area. While
theoretical results indicate that provably secure obfuscation in general is impossible, its …

Dualsc: Automatic generation and summarization of shellcode via transformer and dual learning

G Yang, X Chen, Y Zhou, C Yu - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
A shellcode is a small piece of code and it is executed to exploit a software vulnerability,
which allows the target computer to execute arbitrary commands from the attacker through a …

HMMPayl: An intrusion detection system based on Hidden Markov Models

D Ariu, R Tronci, G Giacinto - computers & security, 2011 - Elsevier
Nowadays the security of Web applications is one of the key topics in Computer Security.
Among all the solutions that have been proposed so far, the analysis of the HTTP payload at …

[PDF][PDF] When a Tree Falls: Using Diversity in Ensemble Classifiers to Identify Evasion in Malware Detectors.

C Smutz, A Stavrou - NDSS, 2016 - ndss-symposium.org
Machine learning classifiers are a vital component of modern malware and intrusion
detection systems. However, past studies have shown that classifier based detection …

Computer security, privacy, and {DNA} sequencing: compromising computers with synthesized {DNA}, privacy leaks, and more

P Ney, K Koscher, L Organick, L Ceze… - 26th USENIX Security …, 2017 - usenix.org
The rapid improvement in DNA sequencing has sparked a big data revolution in genomic
sciences, which has in turn led to a proliferation of bioinformatics tools. To date, these tools …

A tutorial on software obfuscation

S Banescu, A Pretschner - Advances in Computers, 2018 - Elsevier
Protecting a digital asset once it leaves the cyber trust boundary of its creator is a
challenging security problem. The creator is an entity which can range from a single person …

{SHELLOS}: Enabling Fast Detection and Forensic Analysis of Code Injection Attacks

KZ Snow, S Krishnan, F Monrose… - 20th USENIX Security …, 2011 - usenix.org
The availability of off-the-shelf exploitation toolkits for compromising hosts, coupled with the
rapid rate of exploit discovery and disclosure, has made exploit or vulnerability-based …

Design of SMS commanded-and-controlled and P2P-structured mobile botnets

Y Zeng, KG Shin, X Hu - Proceedings of the fifth ACM conference on …, 2012 - dl.acm.org
Botnets are one of the most serious security threats to the Internet and personal computer
(PC) users. Although botnets have not yet caused major outbreaks in the mobile world, with …

Delta: automatic identification of unknown web-based infection campaigns

K Borgolte, C Kruegel, G Vigna - Proceedings of the 2013 ACM SIGSAC …, 2013 - dl.acm.org
Identifying malicious web sites has become a major challenge in today's Internet. Previous
work focused on detecting if a web site is malicious by dynamically executing JavaScript in …