A comprehensive survey of recent internet measurement techniques for cyber security

MS Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - Elsevier
As the Internet has transformed into a critical infrastructure, society has become more
vulnerable to its security flaws. Despite substantial efforts to address many of these …

Tight arms race: Overview of current malware threats and trends in their detection

L Caviglione, M Choraś, I Corona, A Janicki… - IEEE …, 2020 - ieeexplore.ieee.org
Cyber attacks are currently blooming, as the attackers reap significant profits from them and
face a limited risk when compared to committing the “classical” crimes. One of the major …

Exploiting programmatic behavior of llms: Dual-use through standard security attacks

D Kang, X Li, I Stoica, C Guestrin… - 2024 IEEE Security …, 2024 - ieeexplore.ieee.org
Recent advances in instruction-following large language models (LLMs) have led to
dramatic improvements in a range of NLP tasks. Unfortunately, we find that the same …

SoK: cryptojacking malware

E Tekiner, A Acar, AS Uluagac, E Kirda… - 2021 IEEE European …, 2021 - ieeexplore.ieee.org
Emerging blockchain and cryptocurrency-based technologies are redefining the way we
conduct business in cyberspace. Today, a myriad of blockchain and cryp-tocurrency …

Measuring the changing cost of cybercrime

R Anderson, C Barton, R Böhme… - The 18th Annual …, 2019 - research.ed.ac.uk
In 2012 we presented the first systematic study of the costs of cybercrime. In this paper, we
report what has changed in the seven years since. The period has seen major platform …

Survivalism: Systematic analysis of windows malware living-off-the-land

F Barr-Smith, X Ugarte-Pedrero… - … IEEE Symposium on …, 2021 - ieeexplore.ieee.org
As malware detection algorithms and methods become more sophisticated, malware
authors adopt equally sophisticated evasion mechanisms to defeat them. Anecdotal …

Detection of encrypted cryptomining malware connections with machine and deep learning

A Pastor, A Mozo, S Vakaruk, D Canavese… - IEEE …, 2020 - ieeexplore.ieee.org
Nowadays, malware has become an epidemic problem. Among the attacks exploiting the
computer resources of victims, one that has become usual is related to the massive amounts …

Accounting and features of mathematical modeling of the system to forecast cryptocurrency exchange rate

T Tarasova, O Usatenko, A Makurin, V Ivanenko… - …, 2020 - growingscience.com
The objective of this paper is to determine the basic features of the use of mathematical
modeling of the system to forecast cryptocurrency exchange rate. The study determines that …

Navigating the New Frontier of Finance, Art, and Marketing: A Look at Cryptocurrencies, NFTs, and Metaverse

SMN Sakib - Concepts, Technologies, Challenges, and the Future of …, 2023 - igi-global.com
This chapter explores the intersection of finance, art, and marketing in the new frontier of
digital assets, specifically focusing on cryptocurrencies, NFTs, and the metaverse. The …

Inadvertently making cyber criminals rich: A comprehensive study of cryptojacking campaigns at internet scale

HLJ Bijmans, TM Booij, C Doerr - 28th USENIX Security Symposium …, 2019 - usenix.org
Since the release of a browser-based cryptominer by Coinhive in 2017, the easy use of
these miners has skyrocketed illicit cryptomining in 2017 and continued in 2018. This …