Deception techniques have been widely seen as a game changer in cyber defense. In this paper, we review representative techniques in honeypots, honeytokens, and moving target …
Although the concept of ransomware is not new (ie, such attacks date back at least as far as the 1980s), this type of malware has recently experienced a resurgence in popularity. In fact …
In this paper, we present the results of a long-term study of ransomware attacks that have been observed in the wild between 2006 and 2014. We also provide a holistic view on how …
A Juels, RL Rivest - Proceedings of the 2013 ACM SIGSAC conference …, 2013 - dl.acm.org
We propose a simple method for improving the security of hashed passwords: the maintenance of additional``honeywords''(false passwords) associated with each user's …
Methods, systems, and media for detecting covert malware are provided. In accordance with some embodiments, a method for detecting covert malware in a computing environ ment is …
Methods, systems, and media for masquerade attack detec tion by monitoring computer user behavior are provided. In accordance with some embodiments, a method for detecting …
The insider threat remains one of the most vexing problems in computer security. A number of approaches have been proposed to detect nefarious insider actions including user …
A recent trend both in academia and industry is to explore the use of deception techniques to achieve proactive attack detection and defense—to the point of marketing intrusion …