Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–9 of 9 results for author: Pastrana, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.11716  [pdf, other

    cs.CR

    Threat analysis and adversarial model for Smart Grids

    Authors: Javier Sande Ríos, Jesús Canal Sánchez, Carmen Manzano Hernandez, Sergio Pastrana

    Abstract: The power grid is a critical infrastructure that allows for the efficient and robust generation, transmission, delivery and consumption of electricity. In the recent years, the physical components have been equipped with computing and network devices, which optimizes the operation and maintenance of the grid. The cyber domain of this smart power grid opens a new plethora of threats, which adds to… ▽ More

    Submitted 17 June, 2024; originally announced June 2024.

    Comments: Presented at the Workshop on Attackers and Cyber-Crime Operations (WACCO). More details available at https://wacco-workshop.org

  2. arXiv:2405.11876  [pdf, other

    cs.CR

    Understanding crypter-as-a-service in a popular underground marketplace

    Authors: Alejandro de la Cruz, Sergio Pastrana

    Abstract: Crypters are pieces of software whose main goal is to transform a target binary so it can avoid detection from Anti Viruses (AVs from now on) applications. They work similar to packers, by taking a malware binary and applying a series of modifications, obfuscations and encryptions to output a binary that evades one or more AVs. The goal is to remain fully undetected, or FUD in the hacking jargon,… ▽ More

    Submitted 6 June, 2024; v1 submitted 20 May, 2024; originally announced May 2024.

    Comments: A short version of this paper was accepted at the 6th Workshop on Attackers and Cyber-Crime Operations (WACCO)

  3. arXiv:2310.13079  [pdf, other

    cs.CR

    Critical Path Prioritization Dashboard for Alert-driven Attack Graphs

    Authors: Sònia Leal Díaz, Sergio Pastrana, Azqa Nadeem

    Abstract: Although intrusion alerts can provide threat intelligence regarding attacker strategies, extracting such intelligence via existing tools is expensive and time-consuming. Earlier work has proposed SAGE, which generates attack graphs from intrusion alerts using unsupervised sequential machine learning. This paper proposes a querying and prioritization-enabled visual analytics dashboard for SAGE. The… ▽ More

    Submitted 19 October, 2023; originally announced October 2023.

  4. arXiv:2302.08930  [pdf, other

    cs.CR cs.AI

    Towards Automated Homomorphic Encryption Parameter Selection with Fuzzy Logic and Linear Programming

    Authors: José Cabrero-Holgueras, Sergio Pastrana

    Abstract: Homomorphic Encryption (HE) is a set of powerful properties of certain cryptosystems that allow for privacy-preserving operation over the encrypted text. Still, HE is not widespread due to limitations in terms of efficiency and usability. Among the challenges of HE, scheme parametrization (i.e., the selection of appropriate parameters within the algorithms) is a relevant multi-faced problem. First… ▽ More

    Submitted 17 February, 2023; originally announced February 2023.

  5. arXiv:2302.00598  [pdf, other

    cs.SI

    Reviewing War: Unconventional User Reviews as a Side Channel to Circumvent Information Controls

    Authors: José Miguel Moreno, Sergio Pastrana, Jens Helge Reelfs, Pelayo Vallina, Andriy Panchenko, Georgios Smaragdakis, Oliver Hohlfeld, Narseo Vallina-Rodriguez, Juan Tapiador

    Abstract: During the first days of the 2022 Russian invasion of Ukraine, Russia's media regulator blocked access to many global social media platforms and news sites, including Twitter, Facebook, and the BBC. To bypass the information controls set by Russian authorities, pro-Ukrainian groups explored unconventional ways to reach out to the Russian population, such as posting war-related content in the user… ▽ More

    Submitted 1 February, 2023; originally announced February 2023.

  6. Avaddon ransomware: an in-depth analysis and decryption of infected systems

    Authors: Javier Yuste, Sergio Pastrana

    Abstract: The commoditization of Malware-as-a-Service (MaaS) allows criminals to obtain financial benefits at a low risk and with little technical background. One such popular product in the underground economy is ransomware. In ransomware attacks, data from infected systems is held hostage (encrypted) until a fee is paid to the criminals. This modus operandi disrupts legitimate businesses, which may become… ▽ More

    Submitted 9 February, 2021; originally announced February 2021.

    Journal ref: Computers & Security 109 (2021) 102388

  7. arXiv:1905.04576  [pdf, other

    cs.CR cs.CY

    Understanding eWhoring

    Authors: Alice Hutchings, Sergio Pastrana

    Abstract: In this paper, we describe a new type of online fraud, referred to as 'eWhoring' by offenders. This crime script analysis provides an overview of the 'eWhoring' business model, drawing on more than 6,500 posts crawled from an online underground forum. This is an unusual fraud type, in that offenders readily share information about how it is committed in a way that is almost prescriptive. There are… ▽ More

    Submitted 11 May, 2019; originally announced May 2019.

    Journal ref: 4th IEEE European Symposium on Security and Privacy 2019

  8. arXiv:1901.00846  [pdf, other

    cs.CR

    A First Look at the Crypto-Mining Malware Ecosystem: A Decade of Unrestricted Wealth

    Authors: Sergio Pastrana, Guillermo Suarez-Tangil

    Abstract: Illicit crypto-mining leverages resources stolen from victims to mine cryptocurrencies on behalf of criminals. While recent works have analyzed one side of this threat, i.e.: web-browser cryptojacking, only commercial reports have partially covered binary-based crypto-mining malware. In this paper, we conduct the largest measurement of crypto-mining malware to date, analyzing approximately 4.5 mil… ▽ More

    Submitted 25 September, 2019; v1 submitted 3 January, 2019; originally announced January 2019.

    Comments: A shorter version of this paper appears in the Proceedings of 19th ACM Internet Measurement Conference (IMC 2019). This is the full version

  9. arXiv:1607.08774  [pdf, other

    cs.CR

    Shall we collaborate? A model to analyse the benefits of information sharing

    Authors: Roberto Garrido-Pelaz, Lorena Gozalez-Manzano, Sergio Pastrana

    Abstract: Nowadays, both the amount of cyberattacks and their sophistication have considerably increased, and their prevention is of concern of most of organizations. Cooperation by means of information sharing is a promising strategy to address this problem, but unfortunately it poses many challenges. Indeed, looking for a win-win environment is not straightforward and organizations are not properly motiva… ▽ More

    Submitted 29 July, 2016; originally announced July 2016.