A survey of honeypots and honeynets for internet of things, industrial internet of things, and cyber-physical systems

J Franco, A Aris, B Canberk… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
The Internet of Things (IoT), the Industrial Internet of Things (IIoT), and Cyber-Physical
Systems (CPS) have become essential for our daily lives in contexts such as our homes …

SoK: cryptojacking malware

E Tekiner, A Acar, AS Uluagac, E Kirda… - 2021 IEEE European …, 2021 - ieeexplore.ieee.org
Emerging blockchain and cryptocurrency-based technologies are redefining the way we
conduct business in cyberspace. Today, a myriad of blockchain and cryp-tocurrency …

" Get in Researchers; We're Measuring Reproducibility": A Reproducibility Study of Machine Learning Papers in Tier 1 Security Conferences

D Olszewski, A Lu, C Stillman, K Warren… - Proceedings of the …, 2023 - dl.acm.org
Reproducibility is crucial to the advancement of science; it strengthens confidence in
seemingly contradictory results and expands the boundaries of known discoveries …

Avengers, Assemble! survey of WebAssembly security solutions

M Kim, H Jang, Y Shin - 2022 IEEE 15th International …, 2022 - ieeexplore.ieee.org
WebAssembly, abbreviated as Wasm, has emerged as a new paradigm in cloud-native
developments owing to its promising properties. Native execution speed and fast startup …

A first look at code obfuscation for webassembly

S Bhansali, A Aris, A Acar, H Oz… - Proceedings of the 15th …, 2022 - dl.acm.org
WebAssembly (Wasm) has seen a lot of attention lately as it spreads through the mobile
computing domain and becomes the new standard for performance-oriented web …

[HTML][HTML] WebAssembly diversification for malware evasion

J Cabrera-Arteaga, M Monperrus, T Toady… - Computers & Security, 2023 - Elsevier
WebAssembly has become a crucial part of the modern web, offering a faster alternative to
JavaScript in browsers. While boosting rich applications in browser, this technology is also …

An extensive study of residential proxies in China

M Yang, Y Yu, X Mi, S Tang, S Guo, Y Li… - Proceedings of the …, 2022 - dl.acm.org
We carry out the first in-depth characterization of residential proxies (RESIPs) in China, for
which little is studied in previous works. Our study is made possible through a semantic …

[PDF][PDF] A Lightweight IoT Cryptojacking Detection Mechanism in Heterogeneous Smart Home Networks.

E Tekiner, A Acar, AS Uluagac - NDSS, 2022 - ndss-symposium.org
Recently, cryptojacking malware has become an easy way of reaching and profiting from a
large number of victims. Prior works studied the cryptojacking detection systems focusing on …

[HTML][HTML] Detecting cryptojacking web threats: An approach with autoencoders and deep dense neural networks

A Hernandez-Suarez, G Sanchez-Perez… - Applied Sciences, 2022 - mdpi.com
With the growing popularity of cryptocurrencies, which are an important part of day-to-day
transactions over the Internet, the interest in being part of the so-called cryptomining service …

IMCLNet: A lightweight deep neural network for Image-based Malware Classification

B Zou, C Cao, F Tao, L Wang - Journal of Information Security and …, 2022 - Elsevier
With the increasing number of malware and advanced evasion technology, it is more and
more difficult to detect malware accurately and efficiently. To solve this challenge, a feasible …