Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleDecember 2024
Assessing LLMs in malicious code deobfuscation of real-world malware campaigns
Expert Systems with Applications: An International Journal (EXWA), Volume 256, Issue Chttps://doi.org/10.1016/j.eswa.2024.124912AbstractThe integration of large language models (LLMs) into various cybersecurity pipelines has become increasingly prevalent, enabling the automation of numerous manual tasks and often surpassing human performance. Recognising this potential, ...
Highlights- We explore the capacity of state-of-the-art LLMs in code deobfuscation.
- We use real-world data from a well-known large malware campaign.
- We assess LLM accuracy and hallucinations in this task.
- We propose an augmented automated ...
- ArticleSeptember 2024
Outside the Comfort Zone: Analysing LLM Capabilities in Software Vulnerability Detection
AbstractThe significant increase in software production driven by automation and faster development lifecycles has resulted in a corresponding surge in software vulnerabilities. In parallel, the evolving landscape of software vulnerability detection, ...
- research-articleJuly 2024
A comprehensive analysis on software vulnerability detection datasets: trends, challenges, and road ahead
International Journal of Information Security (IJOIS), Volume 23, Issue 5Pages 3311–3327https://doi.org/10.1007/s10207-024-00888-yAbstractAs society’s dependence on information and communication systems (ICTs) grows, so does the necessity of guaranteeing the proper functioning and use of such systems. In this context, it is critical to enhance the security and robustness of the ...
- research-articleAugust 2023
Analysis and Correlation of Visual Evidence in Campaigns of Malicious Office Documents
Digital Threats: Research and Practice (DTRAP), Volume 4, Issue 2Article No.: 26, Pages 1–19https://doi.org/10.1145/3513025Many malware campaigns use Microsoft (MS) Office documents as droppers to download and execute their malicious payload. Such campaigns often use these documents because MS Office is installed on billions of devices and that these files allow the execution ...
- research-articleMarch 2023
A compression strategy for an efficient TSP-based microaggregation▪
Expert Systems with Applications: An International Journal (EXWA), Volume 213, Issue PBhttps://doi.org/10.1016/j.eswa.2022.118980AbstractThe advent of decentralised systems and the continuous collection of personal data managed by public and private entities require the application of measures to guarantee the privacy of individuals. Due to the necessity to preserve both the ...
Highlights- We improve the performance of TSP-based heuristics regardless of the size of data.
- According to data, we can reduce the computational time and the introduced error.
- Extensive experiments show how our method is able to outperform ...
- research-articleAugust 2022
On the effectiveness of binary emulation in malware classification
Journal of Information Security and Applications (JISA), Volume 68, Issue Chttps://doi.org/10.1016/j.jisa.2022.103258AbstractMalware authors continuously evolve their code base to include counter-analysis methods that can significantly hinder their detection and blocking. While malware execution in a sandboxed environment may provide insightful feedback ...
- research-articleMarch 2022
Invoice #31415 attached: Automated analysis of malicious Microsoft Office documents
- Vasilios Koutsokostas,
- Nikolaos Lykousas,
- Theodoros Apostolopoulos,
- Gabriele Orazi,
- Amrita Ghosal,
- Fran Casino,
- Mauro Conti,
- Constantinos Patsakis
AbstractMicrosoft Office may be by far the most widely used suite for processing documents, spreadsheets, and presentations. Due to its popularity, it is continuously utilised to carry out malicious campaigns. Threat actors, exploiting the ...
- research-articleNovember 2021
Unearthing malicious campaigns and actors from the blockchain DNS ecosystem
Computer Communications (COMS), Volume 179, Issue CPages 217–230https://doi.org/10.1016/j.comcom.2021.08.023AbstractBlockchain DNS has emerged as an alternative solution to traditional DNS to address many of its inherent drawbacks. In this regard, a blockchain DNS approach is decentralised, resilient, provides high availability, and prevents ...
- research-articleSeptember 2021
Intercepting Hail Hydra: Real-time detection of Algorithmically Generated Domains
Journal of Network and Computer Applications (JNCA), Volume 190, Issue Chttps://doi.org/10.1016/j.jnca.2021.103135AbstractA crucial technical challenge for cybercriminals is to keep control over the potentially millions of infected devices that build up their botnets, without compromising the robustness of their attacks. A single, fixed C&C server, for ...
- research-articleMarch 2021
A Blockchain framework for reverse logistics of used medical equipment
PCI '20: Proceedings of the 24th Pan-Hellenic Conference on InformaticsPages 148–151https://doi.org/10.1145/3437120.3437295Reverse logistics (RL) activities of medical equipment play a crucial role in properly managing durable medical devices at the end of their life. However, refurbishing medical equipment is not a straightforward process, as there exist many challenges ...
- ArticleOctober 2020
Inside the X-Rated World of “Premium” Social Media Accounts
AbstractDuring the last few years, there has been an upsurge of social media influencers who are part of the adult entertainment industry, referred to as Performers. To monetize their online presence, Performers often engage in practices which violate ...
- research-articleJanuary 2020
Encrypted and covert DNS queries for botnets: Challenges and countermeasures
Highlights- Security mechanisms against DGAs highly depend on the unencrypted nature of DNS queries.
There is a continuous increase in the sophistication that modern malware exercise in order to bypass the deployed security mechanisms. A typical approach to evade the identification and potential take down of a botnet command and ...
- research-articleDecember 2019
Hydras and IPFS: a decentralised playground for malware
International Journal of Information Security (IJOIS), Volume 18, Issue 6Pages 787–799https://doi.org/10.1007/s10207-019-00443-0AbstractModern malware can take various forms and has reached a very high level of sophistication in terms of its penetration, persistence, communication and hiding capabilities. The use of cryptography, and of covert communication channels over public ...
- research-articleNovember 2019
Privacy-preserving collaborative filtering: A new approach based on variable-group-size microaggregation
Electronic Commerce Research and Applications (ECRA), Volume 38, Issue Chttps://doi.org/10.1016/j.elerap.2019.100895Highlights- A novel PPCF method based on variable-sized microaggregation.
- A set of new ...
The amount of available information is growing steadily and, as a result, Internet users benefit from recommender systems, which help them find information, services and products that best fit their needs. A common technique used in ...
- research-articleMay 2019
Defining granularity levels for supply chain traceability based on IoT and blockchain
COINS '19: Proceedings of the International Conference on Omni-Layer Intelligent SystemsPages 184–190https://doi.org/10.1145/3312614.3312652Identifying the optimal granularity level of traceable units is necessary when implementing traceability, particularly in food supply chains. In this paper we propose a generic framework for defining granularity levels based on product's unique ...
- ArticleSeptember 2013
Privacy Preserving Collaborative Filtering with k-Anonymity through Microaggregation
ICEBE '13: Proceedings of the 2013 IEEE 10th International Conference on e-Business EngineeringPages 490–497https://doi.org/10.1109/ICEBE.2013.77Collaborative Filtering (CF) is a recommender system which is becoming increasingly relevant for the industry. Current research focuses on Privacy Preserving Collaborative Filtering (PPCF), whose aim is to solve the privacy issues raised by the ...
- ArticleSeptember 2013
On Privacy Preserving Collaborative Filtering: Current Trends, Open Problems, and New Issues
ICEBE '13: Proceedings of the 2013 IEEE 10th International Conference on e-Business EngineeringPages 244–249https://doi.org/10.1109/ICEBE.2013.37Automatic recommender systems have become a cornerstone of e-commerce, especially after the great welcome of Web 2.0 based on participation and interaction of Internet users. Collaborative Filtering (CF) is a recommender system that is becoming ...