A survey on malware analysis and mitigation techniques

SS Chakkaravarthy, D Sangeetha, V Vaidehi - Computer Science Review, 2019 - Elsevier
In recent days, malwares are advanced, sophisticatedly engineered to attack the target. Most
of such advanced malwares are highly persistent and capable of escaping from the security …

A survey of covert channels and countermeasures in computer network protocols

S Zander, G Armitage, P Branch - … Communications Surveys & …, 2007 - ieeexplore.ieee.org
Covert channels are used for the secret transfer of information. Encryption only protects
communication from being decoded by unauthorised parties, whereas covert channels aim …

“real attackers don't compute gradients”: bridging the gap between adversarial ml research and practice

G Apruzzese, HS Anderson, S Dambra… - … IEEE Conference on …, 2023 - ieeexplore.ieee.org
Recent years have seen a proliferation of research on adversarial machine learning.
Numerous papers demonstrate powerful algorithmic attacks against a wide variety of …

How hard can it be? designing and implementing a deployable multipath {TCP}

C Raiciu, C Paasch, S Barre, A Ford, M Honda… - 9th USENIX symposium …, 2012 - usenix.org
How Hard Can It Be? Designing and Implementing a Deployable Multipath TCP Page 1 How
Hard Can It Be? Designing and Implementing a Deployable Multipath TCP Costin Raiciu† …

{FlowBlaze}: Stateful Packet Processing in Hardware

S Pontarelli, R Bifulco, M Bonola, C Cascone… - … USENIX Symposium on …, 2019 - usenix.org
Programmable NICs allow for better scalability to handle growing network workloads,
however, providing an expressive, yet simple, abstraction to program stateful network …

Evading android runtime analysis via sandbox detection

T Vidas, N Christin - Proceedings of the 9th ACM symposium on …, 2014 - dl.acm.org
The large amounts of malware, and its diversity, have made it necessary for the security
community to use automated dynamic analysis systems. These systems often rely on …

Honeycomb: creating intrusion detection signatures using honeypots

C Kreibich, J Crowcroft - ACM SIGCOMM computer communication …, 2004 - dl.acm.org
This paper describes a system for automated generation of attack signatures for network
intrusion detection systems. Our system applies pattern-matching techniques and protocol …

Mimicry attacks on host-based intrusion detection systems

D Wagner, P Soto - Proceedings of the 9th ACM Conference on …, 2002 - dl.acm.org
We examine several host-based anomaly detection systems and study their security against
evasion attacks. First, we introduce the notion of a mimicry attack, which allows a …

[PDF][PDF] Automated Worm Fingerprinting.

S Singh, C Estan, G Varghese, S Savage - OSDI, 2004 - usenix.org
Network worms are a clear and growing threat to the security of today's Internet-connected
hosts and networks. The combination of the Internet's unrestricted connectivity and …

[图书][B] Information security management handbook

HF Tipton, M Krause - 2007 - taylorfrancis.com
Considered the gold-standard reference on information security, the Information Security
Management Handbook provides an authoritative compilation of the fundamental …