Domain name system security and privacy: A contemporary survey
Abstract The Domain Name System (DNS) is one of the most important components of
today's Internet, and is the standard naming convention between human-readable domain …
today's Internet, and is the standard naming convention between human-readable domain …
Typosquatting and combosquatting attacks on the python ecosystem
Limited automated controls integrated into the Python Package Index (PyPI) package
uploading process make PyPI an attractive target for attackers to trick developers into using …
uploading process make PyPI an attractive target for attackers to trick developers into using …
MalRadar: Demystifying android malware in the new era
Mobile malware detection has attracted massive research effort in our community. A reliable
and up-to-date malware dataset is critical to evaluate the effectiveness of malware detection …
and up-to-date malware dataset is critical to evaluate the effectiveness of malware detection …
Tracking counterfeit cryptocurrency end-to-end
The production of counterfeit money has a long history. It refers to the creation of imitation
currency that is produced without the legal sanction of government. With the growth of the …
currency that is produced without the legal sanction of government. With the growth of the …
Beyond typosquatting: an in-depth look at package confusion
Package confusion incidents-where a developer is misled into importing a package other
than the intended one-are one of the most severe issues in supply chain security with …
than the intended one-are one of the most severe issues in supply chain security with …
Defending against package typosquatting
Software repositories based on a single programming language are common. Examples
include npm (JavaScript) and PyPI (Python). They encourage code reuse, making it trivial for …
include npm (JavaScript) and PyPI (Python). They encourage code reuse, making it trivial for …
Mobile user interface element detection via adaptively prompt tuning
Recent object detection approaches rely on pretrained vision-language models for image-
text alignment. However, they fail to detect the Mobile User Interface (MUI) element since it …
text alignment. However, they fail to detect the Mobile User Interface (MUI) element since it …
Demystifying illegal mobile gambling apps
Mobile gambling app, as a new type of online gambling service emerging in the mobile era,
has become one of the most popular and lucrative underground businesses in the mobile …
has become one of the most popular and lucrative underground businesses in the mobile …
LoneNeuron: a highly-effective feature-domain neural trojan using invisible and polymorphic watermarks
The wide adoption of deep neural networks (DNNs) in real-world applications raises
increasing security concerns. Neural Trojans embedded in pre-trained neural networks are …
increasing security concerns. Neural Trojans embedded in pre-trained neural networks are …
Exploring the unchartered space of container registry typosquatting
With the increasing popularity of containerized applications, container registries have hosted
millions of repositories that allow developers to store, manage, and share their software …
millions of repositories that allow developers to store, manage, and share their software …