A review of security and privacy concerns in the internet of things (IoT)

M Aqeel, F Ali, MW Iqbal, TA Rana, M Arif… - Journal of …, 2022 - Wiley Online Library
The recent two decades have witnessed tremendous growth in Internet of things (IoT)
applications. There are more than 50 billion devices connected globally. IoT applications' …

APT beaconing detection: A systematic review

MA Talib, Q Nasir, AB Nassif, T Mokhamed… - Computers & …, 2022 - Elsevier
Abstract Advanced Persistent Threat (APT) is a type of threat that has grabbed the attention
of researchers, particularly in the industrial security field. APTs are cyber intrusions carried …

Detection of advanced persistent threat using machine-learning correlation analysis

I Ghafir, M Hammoudeh, V Prenosil, L Han… - Future Generation …, 2018 - Elsevier
As one of the most serious types of cyber attack, Advanced Persistent Threats (APT) have
caused major concerns on a global scale. APT refers to a persistent, multi-stage attack with …

Netspectre: Read arbitrary memory over network

M Schwarz, M Schwarzl, M Lipp, J Masters… - … Security–ESORICS 2019 …, 2019 - Springer
All Spectre attacks so far required local code execution. We present the first fully remote
Spectre attack. For this purpose, we demonstrate the first access-driven remote Evict+ …

Analysis of high volumes of network traffic for advanced persistent threat detection

M Marchetti, F Pierazzi, M Colajanni, A Guido - Computer Networks, 2016 - Elsevier
Abstract Advanced Persistent Threats (APTs) are the most critical menaces to modern
organizations and the most challenging attacks to detect. They span over long periods of …

The big four-what we did wrong in advanced persistent threat detection?

N Virvilis, D Gritzalis - 2013 international conference on …, 2013 - ieeexplore.ieee.org
As both the number and the complexity of cyber-attacks continuously increase, it is
becoming evident that current security mechanisms have limited success in detecting …

Scalability, fidelity and stealth in the DRAKVUF dynamic malware analysis system

TK Lengyel, S Maresca, BD Payne… - Proceedings of the 30th …, 2014 - dl.acm.org
Malware is one of the biggest security threats on the Internet today and deploying effective
defensive solutions requires the rapid analysis of a continuously increasing number of …

The cousins of stuxnet: Duqu, flame, and gauss

B Bencsáth, G Pék, L Buttyán, M Felegyhazi - Future Internet, 2012 - mdpi.com
Stuxnet was the first targeted malware that received worldwide attention for causing physical
damage in an industrial infrastructure seemingly isolated from the online world. Stuxnet was …

{CHAINIAC}: Proactive {Software-Update} transparency via collectively signed skipchains and verified builds

K Nikitin, E Kokoris-Kogias, P Jovanovic… - 26th USENIX Security …, 2017 - usenix.org
Software-update mechanisms are critical to the security of modern systems, but their
typically centralized design presents a lucrative and frequently attacked target. In this work …

Early detection of the advanced persistent threat attack using performance analysis of deep learning

JH Joloudari, M Haderbadi, A Mashmool… - IEEE …, 2020 - ieeexplore.ieee.org
One of the most common and critical destructive attacks on the victim system is the
advanced persistent threat (APT)-attack. An APT attacker can achieve its hostile goal …