A survey of honeypots and honeynets for internet of things, industrial internet of things, and cyber-physical systems

J Franco, A Aris, B Canberk… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
The Internet of Things (IoT), the Industrial Internet of Things (IIoT), and Cyber-Physical
Systems (CPS) have become essential for our daily lives in contexts such as our homes …

Ransomware anti-analysis and evasion techniques: A survey and research directions

MN Olaimat, MA Maarof… - 2021 3rd international …, 2021 - ieeexplore.ieee.org
Ransomware has been proven to constitute a severe threat to the world's digital assets.
Resources or devices' recovery from a Crypto-Ransomware infection is practically infeasible …

Full-speed fuzzing: Reducing fuzzing overhead through coverage-guided tracing

S Nagy, M Hicks - 2019 IEEE Symposium on Security and …, 2019 - ieeexplore.ieee.org
Coverage-guided fuzzing is one of the most successful approaches for discovering software
bugs and security vulnerabilities. Of its three main components:(1) test case generation,(2) …

An analysis of conti ransomware leaked source codes

S Alzahrani, Y Xiao, W Sun - IEEE Access, 2022 - ieeexplore.ieee.org
In recent years, there has been an increase in ransomware attacks worldwide. These attacks
aim to lock victims' machines or encrypt their files for ransom. These kinds of ransomware …

Survey on enterprise Internet-of-Things systems (E-IoT): A security perspective

LP Rondon, L Babun, A Aris, K Akkaya, AS Uluagac - Ad Hoc Networks, 2022 - Elsevier
As technology becomes more widely available, millions of users worldwide have installed
some form of smart device in their homes or workplaces. These devices are often off-the …

[PDF][PDF] MINOS: A Lightweight Real-Time Cryptojacking Detection System.

FN Naseem, A Aris, L Babun, E Tekiner, AS Uluagac - NDSS, 2021 - researchgate.net
Emerging WebAssembly (Wasm)-based cryptojacking malware covertly uses the
computational resources of users without their consent or knowledge. Indeed, most victims …

Kratos: Multi-user multi-device-aware access control system for the smart home

AK Sikder, L Babun, ZB Celik, A Acar, H Aksu… - Proceedings of the 13th …, 2020 - dl.acm.org
In a smart home system, multiple users have access to multiple devices, typically through a
dedicated app installed on a mobile device. Traditional access control mechanisms consider …

Resurrecting anti-virtualization and anti-debugging: Unhooking your hooks

T Apostolopoulos, V Katos, KKR Choo… - Future Generation …, 2021 - Elsevier
Dynamic malware analysis involves the debugging of the associated binary files and the
monitoring of changes in sandboxed environments. This allows the investigator to …

Iot sentinel: Correlation-based attack detection, localization, and authentication in iot networks

D Yang, A Kumar, S Ray, W Wang… - 2023 32nd International …, 2023 - ieeexplore.ieee.org
Security issues have become one of the major challenges for Internet-of-Things (IoT)
networks. To overcome this challenge, the recent commonly-used approaches mainly focus …

Xmark: dynamic software watermarking using Collatz conjecture

H Ma, C Jia, S Li, W Zheng, D Wu - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Dynamic software watermarking is one of the major countermeasures against software
licensing violations. However, conventional dynamic watermarking approaches have …