Deception techniques in computer security: A research perspective

X Han, N Kheir, D Balzarotti - ACM Computing Surveys (CSUR), 2018 - dl.acm.org
A recent trend both in academia and industry is to explore the use of deception techniques
to achieve proactive attack detection and defense—to the point of marketing intrusion …

The art, science, and engineering of fuzzing: A survey

VJM Manès, HS Han, C Han, SK Cha… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
Among the many software testing techniques available today, fuzzing has remained highly
popular due to its conceptual simplicity, its low barrier to deployment, and its vast amount of …

[PDF][PDF] Characterization and Comparison of DDoS Attack Tools and Traffic Generators: A Review.

S Behal, K Kumar - Int. J. Netw. Secur., 2017 - ijns.jalaxy.com.tw
Abstract Distributed Denial of Service (DDoS) attack imposes a severe threat to the
extensively used Internet based services like e-commerce, e-banking, transportation …

One Size Does Not Fit All: Uncovering and Exploiting Cross Platform Discrepant {APIs} in {WeChat}

C Wang, Y Zhang, Z Lin - 32nd USENIX Security Symposium (USENIX …, 2023 - usenix.org
The past few years have witnessed a boom of mobile super apps, which are the apps
offering multiple services such as e-commerce, e-learning, and e-government via miniapps …

Towards measuring supply chain attacks on package managers for interpreted languages

R Duan, O Alrawi, RP Kasturi, R Elder… - arXiv preprint arXiv …, 2020 - arxiv.org
Package managers have become a vital part of the modern software development process.
They allow developers to reuse third-party code, share their own code, minimize their …

Reading the tea leaves: A comparative analysis of threat intelligence

VG Li, M Dunn, P Pearce, D McCoy… - 28th USENIX security …, 2019 - usenix.org
The term" threat intelligence" has swiftly become a staple buzzword in the computer security
industry. The entirely reasonable premise is that, by compiling up-to-date information about …

A survey on automated dynamic malware analysis evasion and counter-evasion: Pc, mobile, and web

A Bulazel, B Yener - Proceedings of the 1st Reversing and Offensive …, 2017 - dl.acm.org
Automated dynamic malware analysis systems are important in combating the proliferation
of modern malware. Unfortunately, malware can often easily detect and evade these …

A deep learning approach for detecting malicious JavaScript code

Y Wang, W Cai, P Wei - Security and Communication Networks, 2016 - Wiley Online Library
Malicious JavaScript code in webpages on the Internet is an emergent security issue
because of its universality and potentially severe impact. Because of its obfuscation and …

Xhound: Quantifying the fingerprintability of browser extensions

O Starov, N Nikiforakis - 2017 IEEE Symposium on Security …, 2017 - ieeexplore.ieee.org
In recent years, researchers have shown that unwanted web tracking is on the rise, as
advertisers are trying to capitalize on users' online activity, using increasingly intrusive and …

Ad injection at scale: Assessing deceptive advertisement modifications

K Thomas, E Bursztein, C Grier, G Ho… - … IEEE Symposium on …, 2015 - ieeexplore.ieee.org
Today, web injection manifests in many forms, but fundamentally occurs when malicious and
unwanted actors tamper directly with browser sessions for their own profit. In this work we …