A survey of honeypots and honeynets for internet of things, industrial internet of things, and cyber-physical systems

J Franco, A Aris, B Canberk… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
The Internet of Things (IoT), the Industrial Internet of Things (IIoT), and Cyber-Physical
Systems (CPS) have become essential for our daily lives in contexts such as our homes …

A survey on ransomware: Evolution, taxonomy, and defense solutions

H Oz, A Aris, A Levi, AS Uluagac - ACM Computing Surveys (CSUR), 2022 - dl.acm.org
In recent years, ransomware has been one of the most notorious malware targeting end-
users, governments, and business organizations. It has become a very profitable business …

An insight into the machine-learning-based fileless malware detection

O Khalid, S Ullah, T Ahmad, S Saeed, DA Alabbad… - Sensors, 2023 - mdpi.com
In recent years, massive development in the malware industry changed the entire landscape
for malware development. Therefore, cybercriminals became more sophisticated by …

A first look at code obfuscation for webassembly

S Bhansali, A Aris, A Acar, H Oz… - Proceedings of the 15th …, 2022 - dl.acm.org
WebAssembly (Wasm) has seen a lot of attention lately as it spreads through the mobile
computing domain and becomes the new standard for performance-oriented web …

The dangerous combo: Fileless malware and cryptojacking

S Varlioglu, N Elsayed, Z ElSayed… - SoutheastCon 2022, 2022 - ieeexplore.ieee.org
Fileless malware and cryptojacking attacks have appeared independently as the new
alarming threats in 2017. After 2020, fileless attacks have been devastating for victim …

Watch your back: identifying cybercrime financial relationships in bitcoin through back-and-forth exploration

G Gomez, P Moreno-Sanchez, J Caballero - Proceedings of the 2022 …, 2022 - dl.acm.org
Cybercriminals often leverage Bitcoin for their illicit activities. In this work, we propose back-
and-forth exploration, a novel automated Bitcoin transaction tracing technique to identify …

Cybercrime bitcoin revenue estimations: Quantifying the impact of methodology and coverage

G Gomez, K van Liebergen, J Caballero - Proceedings of the 2023 ACM …, 2023 - dl.acm.org
Multiple works have leveraged the public Bitcoin ledger to estimate the revenue
cybercriminals obtain from their victims. Estimations focusing on the same target often do not …

The design principle of blockchain: An initiative for the sok of soks

LS Zhang - arXiv preprint arXiv:2301.00479, 2023 - arxiv.org
Blockchain, also coined as decentralized AI, has the potential to empower AI to be more
trustworthy by creating a decentralized trust of privacy, security, and audibility. However …

[PDF][PDF] A Lightweight IoT Cryptojacking Detection Mechanism in Heterogeneous Smart Home Networks.

E Tekiner, A Acar, AS Uluagac - NDSS, 2022 - ndss-symposium.org
Recently, cryptojacking malware has become an easy way of reaching and profiting from a
large number of victims. Prior works studied the cryptojacking detection systems focusing on …

On detecting cryptojacking on websites: Revisiting the use of classifiers

FA Aponte-Novoa, D Povedano Álvarez… - Sensors, 2022 - mdpi.com
Cryptojacking or illegal mining is a form of malware that hides in the victim's computer and
takes the computational resources to extract cryptocurrencies in favor of the attacker. It …