Deepcase: Semi-supervised contextual analysis of security events

T Van Ede, H Aghakhani, N Spahn… - … IEEE Symposium on …, 2022 - ieeexplore.ieee.org
Security monitoring systems detect potentially malicious activities in IT infrastructures, by
either looking for known signatures or for anomalous behaviors. Security operators …

Security notifications in static analysis tools: Developers' attitudes, comprehension, and ability to act on them

M Tahaei, K Vaniea, K Beznosov… - Proceedings of the 2021 …, 2021 - dl.acm.org
Static analysis tools (SATs) have the potential to assist developers in finding and fixing
vulnerabilities in the early stages of software development, requiring them to be able to …

Effective notification campaigns on the web: A matter of trust, framing, and support

M Maass, A Stöver, H Pridöhl, S Bretthauer… - 30th USENIX Security …, 2021 - usenix.org
Misconfigurations and outdated software are a major cause of compromised websites and
data leaks. Past research has proposed and evaluated sending automated security …

Secure Real‐Time Artificial Intelligence System against Malicious QR Code Links

MS Al-Zahrani, HAM Wahsheh… - Security and …, 2021 - Wiley Online Library
Recently, hackers intend to reproduce malicious links utilizing several ways to mislead
users. They try to control victims' machines or get their data remotely by gaining access to …

Security, availability, and multiple information sources: Exploring update behavior of system administrators

C Tiefenau, M Häring, K Krombholz… - … Symposium on Usable …, 2020 - usenix.org
Experts agree that kee** systems up to date is a powerful security measure. Previous
work found that users sometimes explicitly refrain from performing timely updates, eg, due to …

On the complexity of the Web's PKI: Evaluating certificate validation of mobile browsers

M Luo, B Feng, L Lu, E Kirda… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Digital certificates are frequently used to secure communications between users and web
servers. Critical to the Web's PKI is the secure validation of digital certificates. Nonetheless …

Systematic analysis and comparison of security advice as datasets

C Bellman, PC van Oorschot - Computers & Security, 2023 - Elsevier
A long list of documents have been offered as security advice, codes of practice, and
security guidelines for building and using security products, including Internet of Things (IoT) …

Secure real-time computational intelligence system against malicious QR code links

HAM Wahsheh, MS Al-Zahrani - International Journal of Computers …, 2021 - univagora.ro
Web attackers aim to propagate malicious links using various techniques to deceive users.
They attempt to control victims' devices or obtain their passwords remotely, thereby …

ARMOR: A Formally Verified Implementation of X. 509 Certificate Chain Validation

J Debnath, C Jenkins, Y Sun, SY Chau… - 2024 IEEE Symposium …, 2024 - computer.org
We present ARMOR, the first substantial effort towards an X. 509 certificate chain validation
logic (CCVL) implementation with formal, machine-checked correctness guarantees for a …

BiCAM: A Bidirectional Contextualized Attentive Model for Analyzing the Correlation of Heterogeneous Security Events

X Luo, J Wang, L Yin, K Zhao, K Qian… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
As the Internet continues to evolve, modern information technology infrastructures are
constantly under attack and need to be continuously monitored for timely responses …