Domain name system security and privacy: A contemporary survey

A Khormali, J Park, H Alasmary, A Anwar, M Saad… - Computer Networks, 2021 - Elsevier
Abstract The Domain Name System (DNS) is one of the most important components of
today's Internet, and is the standard naming convention between human-readable domain …

Typosquatting and combosquatting attacks on the python ecosystem

DL Vu, I Pashchenko, F Massacci… - 2020 ieee european …, 2020 - ieeexplore.ieee.org
Limited automated controls integrated into the Python Package Index (PyPI) package
uploading process make PyPI an attractive target for attackers to trick developers into using …

MalRadar: Demystifying android malware in the new era

L Wang, H Wang, R He, R Tao, G Meng… - Proceedings of the ACM …, 2022 - dl.acm.org
Mobile malware detection has attracted massive research effort in our community. A reliable
and up-to-date malware dataset is critical to evaluate the effectiveness of malware detection …

Tracking counterfeit cryptocurrency end-to-end

B Gao, H Wang, P Xia, S Wu, Y Zhou, X Luo… - Proceedings of the ACM …, 2020 - dl.acm.org
The production of counterfeit money has a long history. It refers to the creation of imitation
currency that is produced without the legal sanction of government. With the growth of the …

Beyond typosquatting: an in-depth look at package confusion

S Neupane, G Holmes, E Wyss, D Davidson… - 32nd USENIX Security …, 2023 - usenix.org
Package confusion incidents-where a developer is misled into importing a package other
than the intended one-are one of the most severe issues in supply chain security with …

Defending against package typosquatting

M Taylor, R Vaidya, D Davidson, L De Carli… - Network and System …, 2020 - Springer
Software repositories based on a single programming language are common. Examples
include npm (JavaScript) and PyPI (Python). They encourage code reuse, making it trivial for …

Mobile user interface element detection via adaptively prompt tuning

Z Gu, Z Xu, H Chen, J Lan, C Meng… - Proceedings of the …, 2023 - openaccess.thecvf.com
Recent object detection approaches rely on pretrained vision-language models for image-
text alignment. However, they fail to detect the Mobile User Interface (MUI) element since it …

Demystifying illegal mobile gambling apps

Y Gao, H Wang, L Li, X Luo, G Xu, X Liu - Proceedings of the Web …, 2021 - dl.acm.org
Mobile gambling app, as a new type of online gambling service emerging in the mobile era,
has become one of the most popular and lucrative underground businesses in the mobile …

LoneNeuron: a highly-effective feature-domain neural trojan using invisible and polymorphic watermarks

Z Liu, F Li, Z Li, B Luo - Proceedings of the 2022 ACM SIGSAC …, 2022 - dl.acm.org
The wide adoption of deep neural networks (DNNs) in real-world applications raises
increasing security concerns. Neural Trojans embedded in pre-trained neural networks are …

Exploring the unchartered space of container registry typosquatting

G Liu, X Gao, H Wang, K Sun - 31st USENIX Security Symposium …, 2022 - usenix.org
With the increasing popularity of containerized applications, container registries have hosted
millions of repositories that allow developers to store, manage, and share their software …