Cyber reconnaissance techniques

W Mazurczyk, L Caviglione - Communications of the ACM, 2021 - dl.acm.org
Cyber reconnaissance techniques Page 1 86 COMMUNICATIONS OF THE ACM | MARCH 2021
| VOL. 64 | NO. 3 review articles IMA GE B Y DE S TROL O VE ALMOST EVERY DAY, security …

Survey and taxonomy of adversarial reconnaissance techniques

S Roy, N Sharmin, JC Acosta, C Kiekintveld… - ACM Computing …, 2022 - dl.acm.org
Adversaries are often able to penetrate networks and compromise systems by exploiting
vulnerabilities in people and systems. The key to the success of these attacks is information …

On subnormal floating point and abnormal timing

M Andrysco, D Kohlbrenner, K Mowery… - … IEEE Symposium on …, 2015 - ieeexplore.ieee.org
We identify a timing channel in the floating point instructions of modern x86 processors: the
running time of floating point addition and multiplication instructions can vary by two orders …

On the vulnerability of anti-malware solutions to DNS attacks

A Nadler, R Bitton, O Brodt, A Shabtai - Computers & Security, 2022 - Elsevier
Anti-malware agents typically communicate with their remote services to share information
about suspicious files. These remote services use their up-to-date information and global …

Antivirus security: naked during updates

B Min, V Varadharajan, U Tupakula… - Software: Practice and …, 2014 - Wiley Online Library
The security of modern computer systems heavily depends on security tools, especially on
antivirus software solutions. In the anti‐malware research community, development of …

Towards discovering and understanding unexpected hazards in tailoring antivirus software for android

H Huang, K Chen, C Ren, P Liu, S Zhu… - Proceedings of the 10th …, 2015 - dl.acm.org
In its latest comparison of Android Virus Detectors (AVDs), the independent lab AV-TEST
reports that they have around 95% malware detection rate. This only indicates that current …

Toward systematically exploring antivirus engines

D Quarta, F Salvioni, A Continella, S Zanero - Detection of Intrusions and …, 2018 - Springer
While different works tested antiviruses (AVs) resilience to obfuscation techniques, no work
studied AVs looking at the big picture, that is including their modern components (eg …

Investigating the detection capabilities of antiviruses under concurrent attacks

MI Al-Saleh, FM AbuHjeela, ZA Al-Sharif - International Journal of …, 2015 - Springer
Cyber security is a major concern of computing systems. Different security controls are
developed to mitigate or prevent cyber attacks. Such controls include cryptography, firewalls …

Antivirus performance characterisation: system‐wide view

MI Al‐Saleh, AM Espinoza… - IET Information …, 2013 - Wiley Online Library
It is well accepted that basic protection against common cyber threats is important, so it is
recommended to have antivirus (AV). However, what price do users pay in terms of …

Analysis, detection, and prevention of cryptographic ransomware

ZA Genç - 2020 - orbilu.uni.lu
Cryptographic ransomware encrypts files on a computer system, thereby blocks access to
victim's data, until a ransom is paid. The quick return in revenue together with the practical …