Real-time system call-based ransomware detection

CJW Chew, V Kumar, P Patros, R Malik - International Journal of …, 2024 - Springer
Ransomware, particularly crypto ransomware, has emerged as the go-to malware for threat
actors aiming to compromise data on Android devices as well as in general. In this paper …

A model-based approach for self-adaptive security in CPS: Application to smart grids

S Chehida, E Rutten, G Giraud, S Mocanu - Journal of Systems …, 2024 - Elsevier
Security risk assessment is an important challenge in the design of Cyber Physical Systems
(CPS). Even more importantly, the intrinsically dynamical nature of these systems, due to …

Compositional Security Analysis of Dynamic Component-based Systems

N Khakpour, C Skandylas - Proceedings of the 39th IEEE/ACM …, 2024 - dl.acm.org
To reason about and enforce security in dynamic software systems, automated analysis and
verification approaches are required. However, such approaches often encounter scalability …

Security Countermeasure Selection for Component-Based Software-Intensive Systems

C Skandylas, N Khakpour… - 2022 IEEE 22nd …, 2022 - ieeexplore.ieee.org
Given the increasing complexity of softwareintensive systems as well as the sophistication
and high frequency of cyber-attacks, automated and sound approaches to select …

Streamlining Attack Tree Generation: A Fragment-Based Approach

I Pekaric, M Frick, JG Adigun, R Groner, T Witte… - arXiv preprint arXiv …, 2023 - arxiv.org
Attack graphs are a tool for analyzing security vulnerabilities that capture different and
prospective attacks on a system. As a threat modeling tool, it shows possible paths that an …

Editorial for FGCS special issue: Advances in self-protecting systems

S Iannucci, E Casalicchio, B Williams - Future Generation Computer …, 2021 - Elsevier
Given the always increasing size of computer systems, manually protecting them in case of
attacks is unfeasible and error-prone. For this reason, a new body of work is emerging …

[PDF][PDF] Study of Self-Protection in Mobile Applications

AA Al Abri, NK Salih - Journal homepage: www. ijrpr. com ISSN - researchgate.net
Business and individuals become more dependent on mobile phones, where the mobility
and the fast increment of mobile applications gives an advantage for the rapid growth of the …

Design and analysis of self-protection: Adaptive security for software-intensive systems

C Skandylas - 15th European Conference on Software Architecture …, 2021 - diva-portal.org
Today's software landscape features a high degree of complexity, frequent change and
many uncertainties. Cyber-attacks are a common occurrence and their consequences are …