Cyber reconnaissance techniques
W Mazurczyk, L Caviglione - Communications of the ACM, 2021 - dl.acm.org
Cyber reconnaissance techniques Page 1 86 COMMUNICATIONS OF THE ACM | MARCH 2021
| VOL. 64 | NO. 3 review articles IMA GE B Y DE S TROL O VE ALMOST EVERY DAY, security …
| VOL. 64 | NO. 3 review articles IMA GE B Y DE S TROL O VE ALMOST EVERY DAY, security …
Survey and taxonomy of adversarial reconnaissance techniques
Adversaries are often able to penetrate networks and compromise systems by exploiting
vulnerabilities in people and systems. The key to the success of these attacks is information …
vulnerabilities in people and systems. The key to the success of these attacks is information …
On subnormal floating point and abnormal timing
We identify a timing channel in the floating point instructions of modern x86 processors: the
running time of floating point addition and multiplication instructions can vary by two orders …
running time of floating point addition and multiplication instructions can vary by two orders …
On the vulnerability of anti-malware solutions to DNS attacks
Anti-malware agents typically communicate with their remote services to share information
about suspicious files. These remote services use their up-to-date information and global …
about suspicious files. These remote services use their up-to-date information and global …
Antivirus security: naked during updates
The security of modern computer systems heavily depends on security tools, especially on
antivirus software solutions. In the anti‐malware research community, development of …
antivirus software solutions. In the anti‐malware research community, development of …
Towards discovering and understanding unexpected hazards in tailoring antivirus software for android
In its latest comparison of Android Virus Detectors (AVDs), the independent lab AV-TEST
reports that they have around 95% malware detection rate. This only indicates that current …
reports that they have around 95% malware detection rate. This only indicates that current …
Toward systematically exploring antivirus engines
While different works tested antiviruses (AVs) resilience to obfuscation techniques, no work
studied AVs looking at the big picture, that is including their modern components (eg …
studied AVs looking at the big picture, that is including their modern components (eg …
Investigating the detection capabilities of antiviruses under concurrent attacks
Cyber security is a major concern of computing systems. Different security controls are
developed to mitigate or prevent cyber attacks. Such controls include cryptography, firewalls …
developed to mitigate or prevent cyber attacks. Such controls include cryptography, firewalls …
Antivirus performance characterisation: system‐wide view
MI Al‐Saleh, AM Espinoza… - IET Information …, 2013 - Wiley Online Library
It is well accepted that basic protection against common cyber threats is important, so it is
recommended to have antivirus (AV). However, what price do users pay in terms of …
recommended to have antivirus (AV). However, what price do users pay in terms of …
Analysis, detection, and prevention of cryptographic ransomware
ZA Genç - 2020 - orbilu.uni.lu
Cryptographic ransomware encrypts files on a computer system, thereby blocks access to
victim's data, until a ransom is paid. The quick return in revenue together with the practical …
victim's data, until a ransom is paid. The quick return in revenue together with the practical …