A taxonomy of attacks and a survey of defence mechanisms for semantic social engineering attacks

R Heartfield, G Loukas - ACM Computing Surveys (CSUR), 2015 - dl.acm.org
Social engineering is used as an umbrella term for a broad spectrum of computer
exploitations that employ a variety of attack vectors and strategies to psychologically …

Survey on cyberspace security

H Zhang, W Han, X Lai, D Lin, J Ma, JH Li - Science China Information …, 2015 - Springer
Along with the rapid development and wide application of information technology, human
society has entered the information era. In this era, people live and work in cyberspace …

Identity-aware convolutional neural network for facial expression recognition

Z Meng, P Liu, J Cai, S Han… - 2017 12th IEEE …, 2017 - ieeexplore.ieee.org
Facial expression recognition suffers under realworldconditions, especially on unseen
subjects due to highinter-subject variations. To alleviate variations introduced bypersonal …

Measuring and modeling the label dynamics of online {Anti-Malware} engines

S Zhu, J Shi, L Yang, B Qin, Z Zhang, L Song… - 29th USENIX Security …, 2020 - usenix.org
VirusTotal provides malware labels from a large set of anti-malware engines, and is heavily
used by researchers for malware annotation and system evaluation. Since different engines …

The Circle of life: A {large-scale} study of the {IoT} malware lifecycle

O Alrawi, C Lever, K Valakuzhy, K Snow… - 30th USENIX Security …, 2021 - usenix.org
Our current defenses against IoT malware may not be adequate to remediate an IoT
malware attack similar to the Mirai botnet. This work seeks to investigate this matter by …

Appintent: Analyzing sensitive data transmission in android for privacy leakage detection

Z Yang, M Yang, Y Zhang, G Gu, P Ning… - Proceedings of the 2013 …, 2013 - dl.acm.org
Android phones often carry personal information, attracting malicious developers to embed
code in Android applications to steal sensitive data. With known techniques in the literature …

AMAL: high-fidelity, behavior-based automated malware analysis and classification

A Mohaisen, O Alrawi, M Mohaisen - computers & security, 2015 - Elsevier
This paper introduces AMAL, an automated and behavior-based malware analysis and
labeling system that addresses shortcomings of the existing systems. AMAL consists of two …

Knowing your enemy: understanding and detecting malicious web advertising

Z Li, K Zhang, Y Xie, F Yu, XF Wang - … of the 2012 ACM conference on …, 2012 - dl.acm.org
With the Internet becoming the dominant channel for marketing and promotion, online
advertisements are also increasingly used for illegal purposes such as propagating …

Manufacturing compromise: the emergence of exploit-as-a-service

C Grier, L Ballard, J Caballero, N Chachra… - Proceedings of the …, 2012 - dl.acm.org
We investigate the emergence of the exploit-as-a-service model for driveby browser
compromise. In this regime, attackers pay for an exploit kit or service to do the" dirty work" of …

User-driven access control: Rethinking permission granting in modern operating systems

F Roesner, T Kohno, A Moshchuk… - … IEEE Symposium on …, 2012 - ieeexplore.ieee.org
Modern client platforms, such as iOS, Android, Windows Phone, Windows 8, and web
browsers, run each application in an isolated environment with limited privileges. A pressing …