A survey of honeypots and honeynets for internet of things, industrial internet of things, and cyber-physical systems
The Internet of Things (IoT), the Industrial Internet of Things (IIoT), and Cyber-Physical
Systems (CPS) have become essential for our daily lives in contexts such as our homes …
Systems (CPS) have become essential for our daily lives in contexts such as our homes …
Ransomware anti-analysis and evasion techniques: A survey and research directions
MN Olaimat, MA Maarof… - 2021 3rd international …, 2021 - ieeexplore.ieee.org
Ransomware has been proven to constitute a severe threat to the world's digital assets.
Resources or devices' recovery from a Crypto-Ransomware infection is practically infeasible …
Resources or devices' recovery from a Crypto-Ransomware infection is practically infeasible …
Full-speed fuzzing: Reducing fuzzing overhead through coverage-guided tracing
Coverage-guided fuzzing is one of the most successful approaches for discovering software
bugs and security vulnerabilities. Of its three main components:(1) test case generation,(2) …
bugs and security vulnerabilities. Of its three main components:(1) test case generation,(2) …
An analysis of conti ransomware leaked source codes
In recent years, there has been an increase in ransomware attacks worldwide. These attacks
aim to lock victims' machines or encrypt their files for ransom. These kinds of ransomware …
aim to lock victims' machines or encrypt their files for ransom. These kinds of ransomware …
Survey on enterprise Internet-of-Things systems (E-IoT): A security perspective
As technology becomes more widely available, millions of users worldwide have installed
some form of smart device in their homes or workplaces. These devices are often off-the …
some form of smart device in their homes or workplaces. These devices are often off-the …
[PDF][PDF] MINOS: A Lightweight Real-Time Cryptojacking Detection System.
Emerging WebAssembly (Wasm)-based cryptojacking malware covertly uses the
computational resources of users without their consent or knowledge. Indeed, most victims …
computational resources of users without their consent or knowledge. Indeed, most victims …
Kratos: Multi-user multi-device-aware access control system for the smart home
In a smart home system, multiple users have access to multiple devices, typically through a
dedicated app installed on a mobile device. Traditional access control mechanisms consider …
dedicated app installed on a mobile device. Traditional access control mechanisms consider …
Resurrecting anti-virtualization and anti-debugging: Unhooking your hooks
T Apostolopoulos, V Katos, KKR Choo… - Future Generation …, 2021 - Elsevier
Dynamic malware analysis involves the debugging of the associated binary files and the
monitoring of changes in sandboxed environments. This allows the investigator to …
monitoring of changes in sandboxed environments. This allows the investigator to …
Iot sentinel: Correlation-based attack detection, localization, and authentication in iot networks
Security issues have become one of the major challenges for Internet-of-Things (IoT)
networks. To overcome this challenge, the recent commonly-used approaches mainly focus …
networks. To overcome this challenge, the recent commonly-used approaches mainly focus …
Xmark: dynamic software watermarking using Collatz conjecture
Dynamic software watermarking is one of the major countermeasures against software
licensing violations. However, conventional dynamic watermarking approaches have …
licensing violations. However, conventional dynamic watermarking approaches have …