The privacy implications of cyber security systems: A technological survey
Cyber-security systems, which protect networks and computers against cyber attacks, are
becoming common due to increasing threats and government regulation. At the same time …
becoming common due to increasing threats and government regulation. At the same time …
A Systematical and longitudinal study of evasive behaviors in windows malware
Malware is one of the prevalent security threats. Sandboxes and, more generally,
instrumented environments play a crucial role in dynamically analyzing malware samples …
instrumented environments play a crucial role in dynamically analyzing malware samples …
Dodgetron: Towards autonomous cyber deception using dynamic hybrid analysis of malware
With the advancement of technology, all our valuable and sensitive information has now
moved into digital formats. Adversary utilizes malware as a medium to steal our information …
moved into digital formats. Adversary utilizes malware as a medium to steal our information …
[PDF][PDF] A natural language processing approach for financial fraud detection
JF Rodríguez, M Papale, M Carminati… - CEUR WORKSHOP …, 2022 - re.public.polimi.it
Due to the proliferation of online banking, people are more exposed than ever to attacks.
Moreover, frauds are becoming more sophisticated, bypassing the security measures put in …
Moreover, frauds are becoming more sophisticated, bypassing the security measures put in …
Advancing Fraud Detection Systems Through Online Learning
The rapid increase in digital transactions has led to a consequential surge in financial fraud,
requiring an automatic way of defending effectively from such a threat. The past few years …
requiring an automatic way of defending effectively from such a threat. The past few years …
API based discrimination of ransomware and benign cryptographic programs
Ransomware is a widespread class of malware that encrypts files in a victim's computer and
extorts victims into paying a fee to regain access to their data. Previous research has …
extorts victims into paying a fee to regain access to their data. Previous research has …
Rogue key and impersonation attacks on FIDO2: From theory to practice
FIDO2 is becoming a defacto standard for passwordless authentication. Using FIDO2 and
WebAuthn, web applications can enable users to associate cryptographic credentials to their …
WebAuthn, web applications can enable users to associate cryptographic credentials to their …
FRAUDability: Estimating Users' Susceptibility to Financial Fraud Using Adversarial Machine Learning
In recent years, financial fraud detection systems have become very efficient at detecting
fraud, which is a major threat faced by e-commerce platforms. Such systems often include …
fraud, which is a major threat faced by e-commerce platforms. Such systems often include …
A server side solution for detecting webinject: A machine learning approach
With the advancement of client-side on the fly web content generation techniques, it
becomes easier for attackers to modify the content of a website dynamically and gain access …
becomes easier for attackers to modify the content of a website dynamically and gain access …
SysTaint: Assisting Reversing of Malicious Network Communications
The ever-increasing number of malware samples demands for automated tools that aid the
analysts in the reverse engineering of complex malicious binaries. Frequently, malware …
analysts in the reverse engineering of complex malicious binaries. Frequently, malware …