A taxonomy of botnet behavior, detection, and defense
S Khattak, NR Ramay, KR Khan… - … surveys & tutorials, 2013 - ieeexplore.ieee.org
A number of detection and defense mechanisms have emerged in the last decade to tackle
the botnet phenomenon. It is important to organize this knowledge to better understand the …
the botnet phenomenon. It is important to organize this knowledge to better understand the …
Survey and taxonomy of botnet research through life-cycle
Of all current threats to cybersecurity, botnets are at the top of the list. In consequence,
interest in this problem is increasing rapidly among the research community and the number …
interest in this problem is increasing rapidly among the research community and the number …
[PDF][PDF] IoTFuzzer: Discovering Memory Corruptions in IoT Through App-based Fuzzing.
With more IoT devices entering the consumer market, it becomes imperative to detect their
security vulnerabilities before an attacker does. Existing binary analysis based approaches …
security vulnerabilities before an attacker does. Existing binary analysis based approaches …
Paybreak: Defense against cryptographic ransomware
Similar to criminals in the physical world, cyber-criminals use a variety of illegal and immoral
means to achieve monetary gains. Recently, malware known as ransomware started to …
means to achieve monetary gains. Recently, malware known as ransomware started to …
TaintScope: A checksum-aware directed fuzzing tool for automatic software vulnerability detection
Fuzz testing has proven successful in finding security vulnerabilities in large programs.
However, traditional fuzz testing tools have a well-known common drawback: they are …
However, traditional fuzz testing tools have a well-known common drawback: they are …
Flexible and fine-grained mandatory access control on android for diverse security and privacy policies
In this paper we tackle the challenge of providing a generic security architecture for the
Android OS that can serve as a flexible and effective ecosystem to instantiate different …
Android OS that can serve as a flexible and effective ecosystem to instantiate different …
Prudent practices for designing malware experiments: Status quo and outlook
Malware researchers rely on the observation of malicious code in execution to collect
datasets for a wide array of experiments, including generation of detection models, study of …
datasets for a wide array of experiments, including generation of detection models, study of …
Undangle: early detection of dangling pointers in use-after-free and double-free vulnerabilities
Use-after-free vulnerabilities are rapidly growing in popularity, especially for exploiting web
browsers. Use-after-free (and double-free) vulnerabilities are caused by a program …
browsers. Use-after-free (and double-free) vulnerabilities are caused by a program …
StateFormer: fine-grained type recovery from binaries using generative state modeling
Binary type inference is a critical reverse engineering task supporting many security
applications, including vulnerability analysis, binary hardening, forensics, and …
applications, including vulnerability analysis, binary hardening, forensics, and …
Inference and analysis of formal models of botnet command and control protocols
We propose a novel approach to infer protocol state machines in the realistic high-latency
network setting, and apply it to the analysis of botnet Command and Control (C &C) …
network setting, and apply it to the analysis of botnet Command and Control (C &C) …