[HTML][HTML] Bridging the gap: A survey and classification of research-informed ethical hacking tools

P Modesti, L Golightly, L Holmes, C Opara… - Journal of Cybersecurity …, 2024 - mdpi.com
The majority of Ethical Hacking (EH) tools utilised in penetration testing are developed by
practitioners within the industry or underground communities. Similarly, academic …

Towards security threats of deep learning systems: A survey

Y He, G Meng, K Chen, X Hu… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Deep learning has gained tremendous success and great popularity in the past few years.
However, deep learning systems are suffering several inherent weaknesses, which can …

[HTML][HTML] Towards a robust, effective and resource efficient machine learning technique for IoT security monitoring

I Zakariyya, H Kalutarage, MO Al-Kadri - Computers & Security, 2023 - Elsevier
Abstract The application of Deep Neural Networks (DNNs) for monitoring cyberattacks in
Internet of Things (IoT) systems has gained significant attention in recent years. However …

Identifying the attack surface for IoT network

S Rizvi, RJ Orr, A Cox, P Ashokkumar, MR Rizvi - Internet of Things, 2020 - Elsevier
For this research, our primary goal is to define an attack surface for networks utilizing the IoT
(Internet of Things) devices. The IoT consists of systems of integrated objects, computing …

[HTML][HTML] Simulating SQL injection vulnerability exploitation using Q-learning reinforcement learning agents

L Erdődi, ÅÅ Sommervoll, FM Zennaro - Journal of Information Security and …, 2021 - Elsevier
In this paper, we propose a formalization of the process of exploitation of SQL injection
vulnerabilities. We consider a simplification of the dynamics of SQL injection attacks by …

Seismic: Secure in-lined script monitors for interrupting cryptojacks

W Wang, B Ferrell, X Xu, KW Hamlen, S Hao - Computer Security: 23rd …, 2018 - Springer
A method of detecting and interrupting unauthorized, browser-based cryptomining is
proposed, based on semantic signature-matching. The approach addresses a new wave of …

{SQIRL}:{Grey-Box} Detection of {SQL} Injection Vulnerabilities Using Reinforcement Learning

S Al Wahaibi, M Foley, S Maffeis - 32nd USENIX Security Symposium …, 2023 - usenix.org
Web security scanners are used to discover SQL injection vulnerabilities in deployed web
applications. Scanners tend to use static rules to cover the most common injection cases …

Systematic review analysis on SQLIA detection and prevention approaches

MS Aliero, KN Qureshi, MF Pasha, I Ghani… - Wireless Personal …, 2020 - Springer
SQL injection attack (SQLIA) is one of the most severe attacks that can be used against web
database driving applications. Attackers use SQLIA to get unauthorized access and perform …

[PDF][PDF] Theory and practice in secure software development lifecycle: A comprehensive survey

M Otieno, D Odera, JE Ounza - World Journal of Advanced …, 2023 - researchgate.net
Software development security refers to the practice of integrating security measures and
considerations throughout the software development lifecycle to ensure the confidentiality …