Enterprise data breach: causes, challenges, prevention, and future directions
A data breach is the intentional or inadvertent exposure of confidential information to
unauthorized parties. In the digital era, data has become one of the most critical components …
unauthorized parties. In the digital era, data has become one of the most critical components …
Method and system for detecting malicious and/or botnet-related domain names
A method and system of detecting a malicious and/or botnet-related domain name,
comprising: reviewing a domain name used in Domain Name System (DNS) traffic in a …
comprising: reviewing a domain name used in Domain Name System (DNS) traffic in a …
Privacy-preserving detection of sensitive data exposure
Statistics from security firms, research institutions and government organizations show that
the number of data-leak instances have grown rapidly in recent years. Among various data …
the number of data-leak instances have grown rapidly in recent years. Among various data …
Method and system for determining whether domain names are legitimate or malicious
4,843,540 A 6, 1989 Stolfo 4,860,201 A 8, 1989 Stolfo et al. 5,363,473 A 11/1994 Stolfo et al.
5,497.486 A 3, 1996 Stolfo et al. 5,563,783 A 10, 1996 Stolfo et al. 5,668,897 A 9, 1997 …
5,497.486 A 3, 1996 Stolfo et al. 5,563,783 A 10, 1996 Stolfo et al. 5,668,897 A 9, 1997 …
Method and system for detecting malicious domain names at an upper DNS hierarchy
7,277,961 7,331,060 7,372,809 7,383,577 7,424,619 7,426,576 7,448,084 7,483,947 7.487,
544 7,536,360 7,634,808 7,639,714 7,657,935 7,665,131 7,698.442 7,752,125 7,752,665 …
544 7,536,360 7,634,808 7,639,714 7,657,935 7,665,131 7,698.442 7,752,125 7,752,665 …
Mimesis Aegis: A Mimicry Privacy {Shield–A}{System's} Approach to Data Privacy on Public Cloud
Users are increasingly storing, accessing, and exchanging data through public cloud
services such as those provided by Google, Facebook, Apple, and Microsoft. Although users …
services such as those provided by Google, Facebook, Apple, and Microsoft. Although users …
Method and system for detecting malware
A system and method of analysis. NX domain names are collected from an asset in a real
network. The NX domain names are domain names that are not registered. The real network …
network. The NX domain names are domain names that are not registered. The real network …
Method and system for network-based detecting of malware from behavioral clustering
(57) ABSTRACT A computerized system and method for performing behav ioral clustering of
malware samples, comprising: executing malware samples in a controlled computer …
malware samples, comprising: executing malware samples in a controlled computer …
Data leak detection as a service
We describe a network-based data-leak detection (DLD) technique, the main feature of
which is that the detection does not reveal the content of the sensitive data. Instead, only a …
which is that the detection does not reveal the content of the sensitive data. Instead, only a …
Eternal sunshine of the spotless machine: Protecting privacy with ephemeral channels
Modern systems keep long memories. As we show in this paper, an adversary who gains
access to a Linux system, even one that implements secure deallocation, can recover the …
access to a Linux system, even one that implements secure deallocation, can recover the …