Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleAugust 2024
ProtAIN: Protecting the Authenticity and Integrity Properties of NFT Images
CompSysTech '24: Proceedings of the International Conference on Computer Systems and Technologies 2024Pages 16–23https://doi.org/10.1145/3674912.3674931Non-Fungible Tokens (or, for short, NFT) establish the ownership and the authenticity of digital assets. Regardless the high security levels provided by blockchain, are not excluded the cases where the ownership of a digital object may be claimed ...
- research-articleSeptember 2023Best Paper
Tamper Detection and Localization in Forensic Images
CompSysTech '23: Proceedings of the 24th International Conference on Computer Systems and TechnologiesPages 117–122https://doi.org/10.1145/3606305.3606317Malicious users may tamper forensic digital images for various reasons including among others the creation of false evidences. In this work we propose a tamper detection and localization technique for forensic digital images detecting whether a ...
- research-articleMarch 2023
A Multiple Watermarking Scheme for Digital Audio Signals
PCI '22: Proceedings of the 26th Pan-Hellenic Conference on InformaticsPages 279–284https://doi.org/10.1145/3575879.3576005Watermarking is a method for the verification of the authenticity of a digital object. In this work we investigate the watermarking of audio signals utilizing watermarked images. We present a multiple watermarking scheme for the watermarking of digital ...
- research-articleAugust 2022
A Synonym-based Approach for the Semantic Indexing of Texts
CompSysTech '22: Proceedings of the 23rd International Conference on Computer Systems and TechnologiesPages 95–102https://doi.org/10.1145/3546118.3546119In this work, we present an algorithmic technique for text indexing based on the utilization of classes of synonyms. The method proposed in this study utilizes a set of synonym classes in order to develop a more abstract representation of a given text ...
- research-articleOctober 2021
Detection and Classification of Malicious Software based on Regional Matching of Temporal Graphs
CompSysTech '21: Proceedings of the 22nd International Conference on Computer Systems and TechnologiesPages 28–33https://doi.org/10.1145/3472410.3472417In this paper we present an integrated graph-based framework that utilizes relations between groups of System-calls, in order to detect whether an unknown software sample is malicious or benign, and to a further extent to classify it to a known malware ...
- research-articleJanuary 2021
A graph-based framework for malicious software detection and classification utilizing temporal-graphs
Journal of Computer Security (JOCS), Volume 29, Issue 6Pages 651–688https://doi.org/10.3233/JCS-210057In this paper we present a graph-based framework that, utilizing relations between groups of System-calls, detects whether an unknown software sample is malicious or benign, and classifies a malicious software to one of a set of known malware families. In ...
- research-articleAugust 2020
An Algorithmic Framework for Malicious Software Detection Exploring Structural Characteristics of Behavioral Graphs
CompSysTech '20: Proceedings of the 21st International Conference on Computer Systems and TechnologiesPages 43–50https://doi.org/10.1145/3407982.3408022In this paper, we present the development of an algorithmic framework for the behavioral detection of malicious software utilizing a set of measurements to explore the structural characteristics of behavioral graphs. We first present the construction of ...
- research-articleJune 2019
Malicious Software Detection utilizing Temporal-Graphs
CompSysTech '19: Proceedings of the 20th International Conference on Computer Systems and TechnologiesPages 49–55https://doi.org/10.1145/3345252.3345269In this work we propose a graph-based model that, utilizing relations between groups of System-calls, distinguishes malicious from benign software samples utilizing a behavioral graph representing their interaction with the operating system. More ...
- research-articleSeptember 2018
A Graph-based Model for Malicious Software Detection Exploiting Domination Relations between System-call Groups
CompSysTech '18: Proceedings of the 19th International Conference on Computer Systems and TechnologiesPages 20–26https://doi.org/10.1145/3274005.3274028In this paper, we propose a graph-based algorithmic technique for malware detection, utilizing the System-call Dependency Graphs (ScDG) obtained through taint analysis traces. We leverage the grouping of system-calls into system-call groups with respect ...
- research-articleDecember 2017
Preventing malware pandemics in mobile devices by establishing response-time bounds
Journal of Information Security and Applications (JISA), Volume 37, Issue CPages 1–14https://doi.org/10.1016/j.jisa.2017.09.002The spread of malicious software among computing devices nowadays poses a major threat to the systems security. Since both the use of mobile devices and the growth of malwares propagation increase rapidly, we are interested in investigating how the time ...
- research-articleJune 2017
Defending Hardware-based Attacks on Trusted Computing using a Hardware-Integrity Attestation Protocol
CompSysTech '17: Proceedings of the 18th International Conference on Computer Systems and TechnologiesPages 155–162https://doi.org/10.1145/3134302.3134320As long as the use of distributed systems and Cloud Computing is significantly increasing, the amount of threats concerning the security of such systems and the data stored in them set great challenges on the application of Trusted Computing. In this ...
- research-articleJune 2016
A Model for Establishing Response-time Bounds to Prevent Malware Pandemics in Mobile Devices
CompSysTech '16: Proceedings of the 17th International Conference on Computer Systems and Technologies 2016Pages 97–104https://doi.org/10.1145/2983468.2983475We study the propagation of a malicious software in a network of mobile devices, which are moving in a specific city area, and establish time bounds for the activation of a counter-measure (i.e., an antivirus or a cleaner) in order to prevent pandemic. ...
- short-paperOctober 2015
Malicious software classification based on relations of system-call groups
PCI '15: Proceedings of the 19th Panhellenic Conference on InformaticsPages 59–60https://doi.org/10.1145/2801948.2802017In this paper we present a graph-based algorithmic technique for classifying unknown malware samples. In order for our model to be resistant against strong mutation of malicious software, we apply our classification technique on a weighted directed ...
- research-articleJune 2015
A graph-based model for malicious code detection exploiting dependencies of system-call groups
CompSysTech '15: Proceedings of the 16th International Conference on Computer Systems and TechnologiesPages 228–235https://doi.org/10.1145/2812428.2812432In this paper, we propose a graph-based algorithmic technique for malware detection. More precisely, we utilize the system-call dependency graphs (or, for short, ScD graphs), obtained by capturing taint analysis traces and a set of various similarity ...