Tight arms race: Overview of current malware threats and trends in their detection
Cyber attacks are currently blooming, as the attackers reap significant profits from them and
face a limited risk when compared to committing the “classical” crimes. One of the major …
face a limited risk when compared to committing the “classical” crimes. One of the major …
Understanding the mirai botnet
The Mirai botnet, composed primarily of embedded and IoT devices, took the Internet by
storm in late 2016 when it overwhelmed several high-profile targets with massive distributed …
storm in late 2016 when it overwhelmed several high-profile targets with massive distributed …
Cyber security in smart grids, threats, and possible solutions
D Ghelani - Authorea Preprints, 2022 - techrxiv.org
The integration of telecommunications in the energy grid, which is paving the way for Smart
Grids, calls into question how the energy sector has historically ensured safe operations …
Grids, calls into question how the energy sector has historically ensured safe operations …
The Circle of life: A {large-scale} study of the {IoT} malware lifecycle
Our current defenses against IoT malware may not be adequate to remediate an IoT
malware attack similar to the Mirai botnet. This work seeks to investigate this matter by …
malware attack similar to the Mirai botnet. This work seeks to investigate this matter by …
A long way to the top: Significance, structure, and stability of internet top lists
A broad range of research areas including Internet measurement, privacy, and network
security rely on lists of target domains to be analysed; researchers make use of target lists …
security rely on lists of target domains to be analysed; researchers make use of target lists …
Opening the blackbox of virustotal: Analyzing online phishing scan engines
Online scan engines such as VirusTotal are heavily used by researchers to label malicious
URLs and files. Unfortunately, it is not well understood how the labels are generated and …
URLs and files. Unfortunately, it is not well understood how the labels are generated and …
[PDF][PDF] Double and nothing: Understanding and detecting cryptocurrency giveaway scams
As cryptocurrencies increase in popularity and users obtain and manage their own assets,
attackers are pivoting from just abusing cryptocurrencies as a payment mechanism, to …
attackers are pivoting from just abusing cryptocurrencies as a payment mechanism, to …
Avclass2: Massive malware tag extraction from av labels
Tags can be used by malware repositories and analysis services to enable searches for
samples of interest across different dimensions. Automatically extracting tags from AV labels …
samples of interest across different dimensions. Automatically extracting tags from AV labels …
Detecting unknown encrypted malicious traffic in real time via flow interaction graph analysis
In this paper, we propose HyperVision, a realtime unsupervised machine learning (ML)
based malicious traffic detection system. Particularly, HyperVision is able to detect unknown …
based malicious traffic detection system. Particularly, HyperVision is able to detect unknown …
Orchestration of APT malware evasive manoeuvers employed for eluding anti-virus and sandbox defense
A Sharma, BB Gupta, AK Singh, VK Saraswat - Computers & Security, 2022 - Elsevier
The modern day cyber attacks are highly targeted and incorporate advanced tactics,
techniques and procedures for greater stealth, impact and success. These attacks are also …
techniques and procedures for greater stealth, impact and success. These attacks are also …