Everything as a service (XaaS) on the cloud: origins, current and future trends

Y Duan, G Fu, N Zhou, X Sun… - 2015 IEEE 8th …, 2015 - ieeexplore.ieee.org
For several years now, scientists have been proposing numerous models for defining
anything" as a service (aaS)", including discussions of products, processes, data & …

On the security of machine learning in malware c&c detection: A survey

J Gardiner, S Nagaraja - ACM Computing Surveys (CSUR), 2016 - dl.acm.org
One of the main challenges in security today is defending against malware attacks. As
trends and anecdotal evidence show, preventing these attacks, regardless of their …

{UNVEIL}: A {Large-Scale}, automated approach to detecting ransomware

A Kharaz, S Arshad, C Mulliner, W Robertson… - 25th USENIX security …, 2016 - usenix.org
Although the concept of ransomware is not new (ie, such attacks date back at least as far as
the 1980s), this type of malware has recently experienced a resurgence in popularity. In fact …

Detection of malicious web activity in enterprise computer networks

AM Oprea, Z Li, R Norris, KD Bowers - US Patent 9,838,407, 2017 - Google Patents
A processing device in one embodiment comprises a processor coupled to a memory and is
configured to obtain internal log data of a computer network of an enterprise, to extract …

Paybreak: Defense against cryptographic ransomware

E Kolodenker, W Koch, G Stringhini… - … of the 2017 ACM on Asia …, 2017 - dl.acm.org
Similar to criminals in the physical world, cyber-criminals use a variety of illegal and immoral
means to achieve monetary gains. Recently, malware known as ransomware started to …

Minesweeper: An in-depth look into drive-by cryptocurrency mining and its defense

RK Konoth, E Vineti, V Moonsamy, M Lindorfer… - Proceedings of the …, 2018 - dl.acm.org
A wave of alternative coins that can be effectively mined without specialized hardware, and
a surge in cryptocurrencies' market value has led to the development of cryptocurrency …

Bitcoin money laundering: mixed results? An explorative study on money laundering of cybercrime proceeds using bitcoin

R Van Wegberg, JJ Oerlemans… - Journal of Financial …, 2018 - emerald.com
Purpose This paper aims to shed light into money laundering using bitcoin. Digital payment
methods are increasingly used by criminals to launder money obtained through cybercrime …

Detection of early-stage enterprise infection by mining large-scale log data

A Oprea, Z Li, TF Yen, SH Chin… - 2015 45th Annual IEEE …, 2015 - ieeexplore.ieee.org
Recent years have seen the rise of sophisticated attacks including advanced persistent
threats (APT) which pose severe risks to organizations and governments. Additionally, new …

The attack of the clones: A study of the impact of shared code on vulnerability patching

A Nappa, R Johnson, L Bilge… - … IEEE symposium on …, 2015 - ieeexplore.ieee.org
Vulnerability exploits remain an important mechanism for malware delivery, despite efforts to
speed up the creation of patches and improvements in software updating mechanisms …

The dropper effect: Insights into malware distribution with downloader graph analytics

BJ Kwon, J Mondal, J Jang, L Bilge… - Proceedings of the 22nd …, 2015 - dl.acm.org
Malware remains an important security threat, as miscreants continue to deliver a variety of
malicious programs to hosts around the world. At the heart of all the malware delivery …