A survey of honeypots and honeynets for internet of things, industrial internet of things, and cyber-physical systems
The Internet of Things (IoT), the Industrial Internet of Things (IIoT), and Cyber-Physical
Systems (CPS) have become essential for our daily lives in contexts such as our homes …
Systems (CPS) have become essential for our daily lives in contexts such as our homes …
SoK: cryptojacking malware
Emerging blockchain and cryptocurrency-based technologies are redefining the way we
conduct business in cyberspace. Today, a myriad of blockchain and cryp-tocurrency …
conduct business in cyberspace. Today, a myriad of blockchain and cryp-tocurrency …
" Get in Researchers; We're Measuring Reproducibility": A Reproducibility Study of Machine Learning Papers in Tier 1 Security Conferences
D Olszewski, A Lu, C Stillman, K Warren… - Proceedings of the …, 2023 - dl.acm.org
Reproducibility is crucial to the advancement of science; it strengthens confidence in
seemingly contradictory results and expands the boundaries of known discoveries …
seemingly contradictory results and expands the boundaries of known discoveries …
Avengers, Assemble! survey of WebAssembly security solutions
WebAssembly, abbreviated as Wasm, has emerged as a new paradigm in cloud-native
developments owing to its promising properties. Native execution speed and fast startup …
developments owing to its promising properties. Native execution speed and fast startup …
A first look at code obfuscation for webassembly
WebAssembly (Wasm) has seen a lot of attention lately as it spreads through the mobile
computing domain and becomes the new standard for performance-oriented web …
computing domain and becomes the new standard for performance-oriented web …
[HTML][HTML] WebAssembly diversification for malware evasion
WebAssembly has become a crucial part of the modern web, offering a faster alternative to
JavaScript in browsers. While boosting rich applications in browser, this technology is also …
JavaScript in browsers. While boosting rich applications in browser, this technology is also …
An extensive study of residential proxies in China
We carry out the first in-depth characterization of residential proxies (RESIPs) in China, for
which little is studied in previous works. Our study is made possible through a semantic …
which little is studied in previous works. Our study is made possible through a semantic …
[PDF][PDF] A Lightweight IoT Cryptojacking Detection Mechanism in Heterogeneous Smart Home Networks.
Recently, cryptojacking malware has become an easy way of reaching and profiting from a
large number of victims. Prior works studied the cryptojacking detection systems focusing on …
large number of victims. Prior works studied the cryptojacking detection systems focusing on …
[HTML][HTML] Detecting cryptojacking web threats: An approach with autoencoders and deep dense neural networks
A Hernandez-Suarez, G Sanchez-Perez… - Applied Sciences, 2022 - mdpi.com
With the growing popularity of cryptocurrencies, which are an important part of day-to-day
transactions over the Internet, the interest in being part of the so-called cryptomining service …
transactions over the Internet, the interest in being part of the so-called cryptomining service …
IMCLNet: A lightweight deep neural network for Image-based Malware Classification
B Zou, C Cao, F Tao, L Wang - Journal of Information Security and …, 2022 - Elsevier
With the increasing number of malware and advanced evasion technology, it is more and
more difficult to detect malware accurately and efficiently. To solve this challenge, a feasible …
more difficult to detect malware accurately and efficiently. To solve this challenge, a feasible …