SoK: cryptojacking malware

E Tekiner, A Acar, AS Uluagac, E Kirda… - 2021 IEEE European …, 2021 - ieeexplore.ieee.org
Emerging blockchain and cryptocurrency-based technologies are redefining the way we
conduct business in cyberspace. Today, a myriad of blockchain and cryp-tocurrency …

Realtime robust malicious traffic detection via frequency domain analysis

C Fu, Q Li, M Shen, K Xu - Proceedings of the 2021 ACM SIGSAC …, 2021 - dl.acm.org
Machine learning (ML) based malicious traffic detection is an emerging security paradigm,
particularly for zero-day attack detection, which is complementary to existing rule based …

[PDF][PDF] Federated analytics: A survey

AR Elkordy, YH Ezzeldin, S Han… - … on Signal and …, 2023 - nowpublishers.com
Federated analytics (FA) is a privacy-preserving framework for computing data analytics
over multiple remote parties (eg, mobile devices) or silo-ed institutional entities (eg …

{Near-Optimal} Oblivious {Key-Value} Stores for Efficient {PSI},{PSU} and {Volume-Hiding}{Multi-Maps}

A Bienstock, S Patel, JY Seo, K Yeo - 32nd USENIX Security Symposium …, 2023 - usenix.org
In this paper, we study oblivious key-value stores (OKVS) that enable encoding n key-value
pairs into length m encodings while hiding the input keys. The goal is to obtain high rate …

" Get in Researchers; We're Measuring Reproducibility": A Reproducibility Study of Machine Learning Papers in Tier 1 Security Conferences

D Olszewski, A Lu, C Stillman, K Warren… - Proceedings of the …, 2023 - dl.acm.org
Reproducibility is crucial to the advancement of science; it strengthens confidence in
seemingly contradictory results and expands the boundaries of known discoveries …

Point cloud analysis for ML-based malicious traffic detection: Reducing majorities of false positive alarms

C Fu, Q Li, K Xu, J Wu - Proceedings of the 2023 ACM SIGSAC …, 2023 - dl.acm.org
As an emerging security paradigm, machine learning (ML) based malicious traffic detection
is an essential part of automatic defense against network attacks. Powered by dedicated …

Frequency domain feature based robust malicious traffic detection

C Fu, Q Li, M Shen, K Xu - IEEE/ACM Transactions on …, 2022 - ieeexplore.ieee.org
Machine learning (ML) based malicious traffic detection is an emerging security paradigm,
particularly for zero-day attack detection, which is complementary to existing rule based …

DynamIPs: Analyzing address assignment practices in IPv4 and IPv6

R Padmanabhan, JP Rula, P Richter… - Proceedings of the 16th …, 2020 - dl.acm.org
IP addresses are commonly used to identify hosts or properties of hosts. The address
assigned to a host may change, however, and the extent to which these changes occur in …

# twiti: Social listening for threat intelligence

H Shin, WC Shim, S Kim, S Lee, YG Kang… - Proceedings of the Web …, 2021 - dl.acm.org
Twitter is a popular public source for threat hunting. Many security vendors and security
professionals use Twitter in practice for collecting Indicators of Compromise (IOCs) …

Warmonger: inflicting denial-of-service via serverless functions in the cloud

J Xiong, M Wei, Z Lu, Y Liu - Proceedings of the 2021 ACM SIGSAC …, 2021 - dl.acm.org
We debut the Warmonger attack, a novel attack vector that can cause denial-of-service
between a serverless computing platform and an external content server. The Warmonger …