Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Tight arms race: Overview of current malware threats and trends in their detection
Cyber attacks are currently blooming, as the attackers reap significant profits from them and
face a limited risk when compared to committing the “classical” crimes. One of the major …
face a limited risk when compared to committing the “classical” crimes. One of the major …
[HTML][HTML] Trends and challenges in network covert channels countermeasures
L Caviglione - Applied Sciences, 2021 - mdpi.com
Network covert channels are increasingly used to endow malware with stealthy behaviors,
for instance to exfiltrate data or to orchestrate nodes of a botnet in a cloaked manner …
for instance to exfiltrate data or to orchestrate nodes of a botnet in a cloaked manner …
[HTML][HTML] Kernel-level tracing for detecting stegomalware and covert channels in Linux environments
Modern malware is becoming hard to spot since attackers are increasingly adopting new
techniques to elude signature-and rule-based detection mechanisms. Among the others …
techniques to elude signature-and rule-based detection mechanisms. Among the others …
Exfiltrating data from air-gapped computers via ViBrAtIoNs
M Guri - Future Generation Computer Systems, 2021 - Elsevier
Air-gap covert channels are special types of covert communication channels that enable
attackers to exfiltrate data from isolated, network-less computers. Various types of air-gap …
attackers to exfiltrate data from isolated, network-less computers. Various types of air-gap …
Programmable data gathering for detecting stegomalware
The “arm race” against malware developers requires to collect a wide variety of performance
measurements, for instance to face threats leveraging information hiding and …
measurements, for instance to face threats leveraging information hiding and …
Covert channels in IoT deployments through data hiding techniques
Interconnected and always on devices are continuously and rapidly growing in number and,
according to a study from Cisco, will be three times the number of humans on earth in 2021 …
according to a study from Cisco, will be three times the number of humans on earth in 2021 …
Reversible and plausibly deniable covert channels in one-time passwords based on hash chains
J Keller, S Wendzel - Applied Sciences, 2021 - mdpi.com
Covert channels enable stealthy communications over innocent appearing carriers. They
are increasingly applied in the network context. However, little work is available that exploits …
are increasingly applied in the network context. However, little work is available that exploits …
Teaching android mobile security
At present, computer science studies generally offer courses addressing mobile
development and they use mobile technologies for illustrating theoretical concepts such as …
development and they use mobile technologies for illustrating theoretical concepts such as …
Covert channel establishment through the dynamic adaptation of the sequential probability ratio test to sensor data in IoT
JW Ho - IEEE Access, 2019 - ieeexplore.ieee.org
Owing to their hidden natures, covert channels can be utilized such that trojan applications
can communicate stealthily with each other or exchange stolen private information without …
can communicate stealthily with each other or exchange stolen private information without …
DYST (Did You See That?): An Amplified Covert Channel That Points To Previously Seen Data
Covert channels are stealthy communication channels that enable manifold adversary and
legitimate scenarios, ranging from stealthy malware communications to the exchange of …
legitimate scenarios, ranging from stealthy malware communications to the exchange of …