Inbox Invasion: Exploiting MIME Ambiguities to Evade Email Attachment Detectors
Email attachments have become a favored delivery vector for malware campaigns. In
response, email attachment detectors are widely deployed to safeguard email security …
response, email attachment detectors are widely deployed to safeguard email security …
Hyperlink Hijacking: Exploiting Erroneous URL Links to Phantom Domains
K Saric, F Savins, GS Ramachandran… - Proceedings of the …, 2024 - dl.acm.org
Web users often follow hyperlinks hastily, expecting them to be correctly programmed.
However, it is possible those links contain typos or other mistakes. By discovering active but …
However, it is possible those links contain typos or other mistakes. By discovering active but …
Accelerating Convergence in Data Offloading Solutions: A Greedy-Assisted Genetic Algorithm Approach
MI Zulfa, SP Chrismawan, AM Hartoyo… - … Journal of Robotics …, 2024 - pubs2.ascee.org
Data offloading, a technique that distributes data across the network, is crucial for alleviating
congestion and enhancing system performance. One challenge in this process is optimizing …
congestion and enhancing system performance. One challenge in this process is optimizing …
Parsing millions of URLs per second
URLs are fundamental elements of web applications. By applying vector algorithms, we built
a fast standard‐compliant C++ implementation. Our parser uses three times fewer …
a fast standard‐compliant C++ implementation. Our parser uses three times fewer …
A Survey of Parser Differential Anti-Patterns
Parser differentials emerge when two (or more) parsers interpret the same input in different
ways. Differences in parsing behavior are difficult to detect due to (1) challenges in …
ways. Differences in parsing behavior are difficult to detect due to (1) challenges in …
Der Phish und die Nutzerin: Formalisierung, Konzeption und Analyse
O Wiese - 2023 - refubium.fu-berlin.de
Phishing-Angriffe sind im Internetzeitalter eine dauerhafte Erscheinung geworden. Eine nur
technische Lösung zur Phishing-Bekämpfung bei E-Mails wurde bisher noch nicht …
technische Lösung zur Phishing-Bekämpfung bei E-Mails wurde bisher noch nicht …
Parsing Millions of URLs per Second
URLs are fundamental elements of web applications. By applying vector algorithms, we built
a fast standard-compliant C++ implementation. Our parser uses three times fewer …
a fast standard-compliant C++ implementation. Our parser uses three times fewer …
Evading Antivirus Detection by Abusing File Type Identification
C Udomwongsa - 2024 - digitalcommons.dartmouth.edu
File type identification is a vital step in automated file processing, especially in the realm of
malware detection. The challenges with file type identification and evasion techniques that …
malware detection. The challenges with file type identification and evasion techniques that …
[PDF][PDF] Misdirection of Trust: Demystifying the Abuse of Dedicated URL Shortening Service
Dedicated URL shortening services (DUSSs) are designed to transform trusted long URLs
into the shortened links. Since DUSSs are widely used in famous corporations to better …
into the shortened links. Since DUSSs are widely used in famous corporations to better …