Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleDecember 2024
Fuzzing and Symbolic Execution for Multipath Malware Tracing: Bridging Theory and Practice via Survey and Experiments
Digital Threats: Research and Practice (DTRAP), Volume 5, Issue 4Article No.: 41, Pages 1–33https://doi.org/10.1145/3700147In real life, distinct runs of the same artifact lead to the exploration of different paths, due to either system’s natural randomness or malicious constructions. These variations might completely change execution outcomes (extreme case). Thus, to analyze ...
- research-articleDecember 2024
- research-articleOctober 2024
On NVD Users’ Attitudes, Experiences, Hopes, and Hurdles
Digital Threats: Research and Practice (DTRAP), Volume 5, Issue 3Article No.: 33, Pages 1–19https://doi.org/10.1145/3688806The National Vulnerability Database (NVD) is a major vulnerability database that is free to use for everyone. It provides information about vulnerabilities and further useful resources such as linked advisories and patches. The NVD is often considered as ...
- research-articleOctober 2024
InvesTEE: A TEE-supported Framework for Lawful Remote Forensic Investigations
Digital Threats: Research and Practice (DTRAP), Volume 5, Issue 3Article No.: 27, Pages 1–20https://doi.org/10.1145/3680294Remote forensic investigations, i.e., the covert lawful infiltration of computing devices, are a generic method to acquire evidence in the presence of strong defensive security. A precondition for such investigations is the ability to execute software ...
- research-articleOctober 2024
Does Cyber Insurance Promote Cyber Security Best Practice? An Analysis Based on Insurance Application Forms
Digital Threats: Research and Practice (DTRAP), Volume 5, Issue 3Article No.: 25, Pages 1–39https://doi.org/10.1145/3676283The significant rise in digital threats and attacks has led to an increase in the use of cyber insurance as a cyber risk treatment method intended to support organisations in the event of a security breach. Insurance providers are set up to assume such ...
-
- research-articleSeptember 2024
CuMONITOR: Continuous Monitoring of Microarchitecture for Software Task Identification and Classification
Digital Threats: Research and Practice (DTRAP), Volume 5, Issue 3Article No.: 22, Pages 1–22https://doi.org/10.1145/3652861The interactions between software and hardware are increasingly important to computer system security. This research collected microprocessor control signal sequences to develop machine learning models that identify software tasks. In contrast with prior ...
- research-articleSeptember 2024
ADAPT: Adaptive Camouflage Based Deception Orchestration For Trapping Advanced Persistent Threats
- Venkata Sai Charan Putrevu,
- Subhasis Mukhopadhyay,
- Subhajit Manna,
- Nanda Rani,
- Ansh Vaid,
- Hrushikesh Chunduri,
- Mohan Anand Putrevu,
- Sandeep Shukla
Digital Threats: Research and Practice (DTRAP), Volume 5, Issue 3Article No.: 21, Pages 1–35https://doi.org/10.1145/3651991Honeypots serve as a valuable deception technology, enabling security teams to gain insights into the behaviour patterns of attackers and investigate cyber security breaches. However, traditional honeypots prove ineffective against advanced adversaries ...
- research-articleJune 2024
Spacelord: Private and Secure Smart Space Sharing
Digital Threats: Research and Practice (DTRAP), Volume 5, Issue 2Article No.: 14, Pages 1–27https://doi.org/10.1145/3637879Space sharing services like vacation rentals and meeting rooms are being equipped with smart devices such as cameras, door locks and many other sensors. However, the sharing of such devices poses privacy and security problems, as there is typically no ...
- research-articleMarch 2024
Machine Learning (In) Security: A Stream of Problems
- Fabrício Ceschin,
- Marcus Botacin,
- Albert Bifet,
- Bernhard Pfahringer,
- Luiz S. Oliveira,
- Heitor Murilo Gomes,
- André Grégio
Digital Threats: Research and Practice (DTRAP), Volume 5, Issue 1Article No.: 9, Pages 1–32https://doi.org/10.1145/3617897Machine Learning (ML) has been widely applied to cybersecurity and is considered state-of-the-art for solving many of the open issues in that field. However, it is very difficult to evaluate how good the produced solutions are, since the challenges faced ...
- research-articleAugust 2023
Towards a Greater Understanding of Coordinated Vulnerability Disclosure Policy Documents
Digital Threats: Research and Practice (DTRAP), Volume 4, Issue 2Article No.: 29, Pages 1–36https://doi.org/10.1145/3586180Bug bounty programmes and vulnerability disclosure programmes, collectively referred to as Coordinated Vulnerability Disclosure (CVD) programmes, open up an organisation’s assets to the inquisitive gaze of (often eager) white-hat hackers. Motivated by the ...
- research-articleAugust 2023
OATs’inside: Retrieving Object Behaviors From Native-based Obfuscated Android Applications
Digital Threats: Research and Practice (DTRAP), Volume 4, Issue 2Article No.: 30, Pages 1–27https://doi.org/10.1145/3584975Analyzing Android applications is essential to review proprietary code and to understand malware behaviors. However, Android applications use obfuscation techniques to slow down this process. These obfuscation techniques are increasingly based on native ...
- research-articleMarch 2023
An Analysis of Adversary-Centric Security Testing within Information and Operational Technology Environments
Digital Threats: Research and Practice (DTRAP), Volume 4, Issue 1Article No.: 14, Pages 1–29https://doi.org/10.1145/3569958Assurance techniques such as adversary-centric security testing are an essential part of the risk assessment process for improving risk mitigation and response capabilities against cyber attacks. While the use of these techniques, including vulnerability ...
- noteMarch 2023
AMiner: A Modular Log Data Analysis Pipeline for Anomaly-based Intrusion Detection
Digital Threats: Research and Practice (DTRAP), Volume 4, Issue 1Article No.: 12, Pages 1–16https://doi.org/10.1145/3567675Cyber attacks are omnipresent and their rapid detection is crucial for system security. Signature-based intrusion detection monitors systems for attack indicators and plays an important role in recognizing and preventing such attacks. Unfortunately, it is ...
- research-articleMarch 2023
InviSeal: A Stealthy Dynamic Analysis Framework for Android Systems
Digital Threats: Research and Practice (DTRAP), Volume 4, Issue 1Article No.: 13, Pages 1–31https://doi.org/10.1145/3567599With wide adaptation of open-source Android into mobile devices by different device vendors, sophisticated malware are developed to exploit security vulnerabilities. As comprehensive security analysis on physical devices are impractical and costly, ...
- research-articleMarch 2023
LGuard: Securing Enterprise-IoT Systems against Serial-Based Attacks via Proprietary Communication Buses
Digital Threats: Research and Practice (DTRAP), Volume 4, Issue 1Article No.: 10, Pages 1–26https://doi.org/10.1145/3555721Enterprise Internet of Things (E-IoT) systems allow users to control audio, video, scheduled events, lightning fixtures, door access, and relays in complex smart installations. These systems are widely used in government or smart private offices, smart ...
- research-articleMarch 2023
Fight Hardware with Hardware: Systemwide Detection and Mitigation of Side-channel Attacks Using Performance Counters
Digital Threats: Research and Practice (DTRAP), Volume 4, Issue 1Article No.: 5, Pages 1–24https://doi.org/10.1145/3519601We present a kernel-level infrastructure that allows systemwide detection of malicious applications attempting to exploit cache-based side-channel attacks to break the process confinement enforced by standard operating systems. This infrastructure relies ...