Unraveling Attacks to Machine Learning-Based IoT Systems: A Survey and the Open Libraries Behind Them

C Liu, B Chen, W Shao, C Zhang… - IEEE Internet of …, 2024 - ieeexplore.ieee.org
The advent of the Internet of Things (IoT) has brought forth an era of unprecedented
connectivity, with an estimated 80 billion smart devices expected to be in operation by the …

Cyberterrorism as a global threat: a review on repercussions and countermeasures

S Iftikhar - PeerJ Computer Science, 2024 - peerj.com
An act of cyberterrorism involves using the internet and other forms of information and
communication technology to threaten or cause bodily harm to gain political or ideological …

Exposing the rat in the tunnel: Using traffic analysis for tor-based malware detection

P Dodia, M AlSabah, O Alrawi, T Wang - Proceedings of the 2022 ACM …, 2022 - dl.acm.org
Tor~\citetor is the most widely used anonymous communication network with millions of
daily users~\citetormetrics. Since Tor provides server and client anonymity, hundreds of …

Soda: A system for cyber deception orchestration and automation

MSI Sajid, J Wei, B Abdeen, E Al-Shaer… - Proceedings of the 37th …, 2021 - dl.acm.org
Active Cyber Deception (ACD) has emerged as an effective proactive cyber defense
technique that can mislead adversaries by presenting falsified data and allow opportunities …

SymbSODA: configurable and verifiable orchestration automation for active malware deception

MSI Sajid, J Wei, E Al-Shaer, Q Duan… - ACM Transactions on …, 2023 - dl.acm.org
Malware is commonly used by adversaries to compromise and infiltrate cyber systems in
order to steal sensitive information or destroy critical assets. Active Cyber Deception (ACD) …

SYMBEXCEL: automated analysis and understanding of malicious excel 4.0 macros

N Ruaro, F Pagani, S Ortolani… - … IEEE Symposium on …, 2022 - ieeexplore.ieee.org
Malicious software (malware) poses a significant threat to the security of our networks and
users. In the ever-evolving malware landscape, Excel 4.0 Office macros (XL4) have recently …

Hiding in plain sight: An empirical study of web application abuse in malware

M Yao, J Fuller, RP Kasturi, S Agarwal… - 32nd USENIX Security …, 2023 - usenix.org
Web applications provide a wide array of utilities that are abused by malware as a
replacement for traditional attacker-controlled servers. Thwarting these Web App-Engaged …

MRm-DLDet: a memory-resident malware detection framework based on memory forensics and deep neural network

J Liu, Y Feng, X Liu, J Zhao, Q Liu - Cybersecurity, 2023 - Springer
Cyber attackers have constantly updated their attack techniques to evade antivirus software
detection in recent years. One popular evasion method is to execute malicious code and …

Scaphy: Detecting modern ics attacks by correlating behaviors in scada and physical

M Ike, K Phan, K Sadoski, R Valme… - 2023 IEEE Symposium …, 2023 - ieeexplore.ieee.org
Modern Industrial Control Systems (ICS) attacks evade existing tools by using knowledge of
ICS processes to blend their activities with benign Supervisory Control and Data Acquisition …

Application of data collected by endpoint detection and response systems for implementation of a network security system based on zero trust principles and the …

N Kumar, GS Kasbekar, D Manjunath - ACM SIGMETRICS Performance …, 2023 - dl.acm.org
Traditionally, security systems for enterprises have implicit access based on strong
cryptography, authentication and key sharing, wherein access control is based on Role …