Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleNovember 2022
Contextualizing System Calls in Containers for Anomaly-Based Intrusion Detection
CCSW'22: Proceedings of the 2022 on Cloud Computing Security WorkshopPages 9–21https://doi.org/10.1145/3560810.3564266Container technology has gained ground in the industry for its scalability and lightweight virtualization, especially in cloud environments. Nevertheless, research has shown that containerized applications are an appealing target for cyberattacks, which ...
- research-articleMay 2022
ReDPro: an automated technique to detect and regenerate process-level concurrency failures
ACMSE '22: Proceedings of the 2022 ACM Southeast ConferencePages 106–112https://doi.org/10.1145/3476883.3520207Process-level concurrency failures occur when multiple processes read and write a shared data item without proper synchronization. Process-level failures are difficult to detect because they are sensitive to the execution order of system calls. These ...
- research-articleJanuary 2022
Directed-System-Call-Graph Feature for IoT Botnet Detection
Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology (JIFS), Volume 43, Issue 5Pages 5453–5470https://doi.org/10.3233/JIFS-211882Nowadays, the number and types of IoT devices are increasing rapidly, which leads to an expansion in the attack surface of this kind of device. Besides, the number of Botnet malware on IoT devices also grows with a lot of new variants. This context leads ...
- research-articleDecember 2021
On the Detection of Exploitation of Vulnerabilities That Leads to the Execution of a Malicious Code
Automatic Control and Computer Sciences (ACCS), Volume 55, Issue 7Pages 827–837https://doi.org/10.3103/S0146411621070233AbstractSoftware protection from exploitation of possible unknown vulnerabilities can be ensured both by searching for (for example, using symbolic execution) and subsequently eliminating vulnerabilities and by means of detection and/or intrusion ...
- research-articleOctober 2021
-
Practical fault detection in puppet programs
ICSE '20: Proceedings of the ACM/IEEE 42nd International Conference on Software EngineeringPages 26–37https://doi.org/10.1145/3377811.3380384Puppet is a popular computer system configuration management tool. By providing abstractions that model system resources it allows administrators to set up computer systems in a reliable, predictable, and documented fashion. Its use suffers from two ...
- research-articleFebruary 2020
C + Go = An Alternate Approach Toward the Linux Programming Course
SIGCSE '20: Proceedings of the 51st ACM Technical Symposium on Computer Science EducationPages 933–939https://doi.org/10.1145/3328778.3366944The use of the C programming language in a Linux programming course---common in most undergraduate computer science programs---has been the standard practice for nearly thirty years. The use of C is appropriate because Linux is written in C and, thus, ...
- research-articleNovember 2019
A System-level Behavioral Detection Framework for Compromised CPS Devices: Smart-Grid Case
ACM Transactions on Cyber-Physical Systems (TCPS), Volume 4, Issue 2Article No.: 16, Pages 1–28https://doi.org/10.1145/3355300Cyber-Physical Systems (CPS) play a significant role in our critical infrastructure networks from power-distribution to utility networks. The emerging smart-grid concept is a compelling critical CPS infrastructure that relies on two-way communications ...
- posterMay 2019
Ensemble malware analysis for evaluating the integrity of mission critical devices poster: poster
WiSec '19: Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile NetworksPages 302–303https://doi.org/10.1145/3317549.3326301The rapid evolution of technology in our sociality has brought great advantages, but at the same time it has increased the cybersecurity threats associated with a constantly expanded surface exposure. At the forefront of these threats is the ...
- posterJuly 2018
Application-transparent scheduling of socket system calls on many-core systems
ANCS '18: Proceedings of the 2018 Symposium on Architectures for Networking and Communications SystemsPages 174–176https://doi.org/10.1145/3230718.3232113As the number of cores equipped in network servers is rapidly increasing, a greater number of processes or threads run concurrently. However, if these tasks invoke system calls frequently, they are not executed as concurrently as expected due to the ...
- abstractMay 2018
Analyzing a decade of Linux system calls
ICSE '18: Proceedings of the 40th International Conference on Software EngineeringPage 267https://doi.org/10.1145/3180155.3182518The Linux kernel provides its services to the application layer using so-called system calls. All system calls combined form the Application Programming Interface (API) of the kernel. Hence, system calls provide us with a window into the development ...
- articleNovember 2016
Generative versus discriminative classifiers for android anomaly-based detection system using system calls filtering and abstraction process
Security and Communication Networks (SACN), Volume 9, Issue 16Pages 3483–3495https://doi.org/10.1002/sec.1555Anomaly-based detection techniques have been widely studied in recent years. Most of these efforts have focused to improve the accuracy of these techniques. The poor accuracy performance is caused by two factors: i the data used for the analysis is ...
- research-articleMarch 2016
Evaluation of Android Malware Detection Based on System Calls
IWSPA '16: Proceedings of the 2016 ACM on International Workshop on Security And Privacy AnalyticsPages 1–8https://doi.org/10.1145/2875475.2875487With Android being the most widespread mobile platform, protecting it against malicious applications is essential. Android users typically install applications from large remote repositories, which provides ample opportunities for malicious newcomers. ...
- short-paperSeptember 2015
DynaDroid: dynamic binary instrumentation based app behavior monitoring framework
SIN '15: Proceedings of the 8th International Conference on Security of Information and NetworksPages 322–325https://doi.org/10.1145/2799979.2800036Android OS market share has made it a feverish target of malicious attacks. Dynamic Binary Instrumentation (DBI) based tools are gaining prominence for behavioral program inspection, feature identification and virtual machine binary code translation. ...
- ArticleMarch 2015
Android Mobile Malware Surveillance Exploitation via Call Logs: Proof of Concept
- Madihah Mohd Saudi,
- Farida Ridzuan,
- Nurlida Basir,
- N. F. Nabila,
- Sakinah Ali Pitchay,
- Intan Nurfarahin Ahmad
UKSIM '15: Proceedings of the 2015 17th UKSIM-AMSS International Conference on Modelling and SimulationPages 176–181https://doi.org/10.1109/UKSim.2015.89The invention of smartphone have made life easier as it is capable of providing important functions used in user's daily life. While different operating system (OS) platform was built for smartphone, Android has become one of the most popular choice. ...
- research-articleJune 2014
CARE, the comprehensive archiver for reproducible execution
TRUST '14: Proceedings of the 1st ACM SIGPLAN Workshop on Reproducible Research Methodologies and New Publication Models in Computer EngineeringArticle No.: 1, Pages 1–7https://doi.org/10.1145/2618137.2618138We present CARE, the Comprehensive Archiver for Reproducible Execution on Linux. CARE runs in userland, requires no setup and performs a single task: building an archive that contains selected executables and files accessed by a given application during ...
- ArticleNovember 2013
XLRF: A Cross-Layer Intrusion Recovery Framework for Damage Assessment and Recovery Plan Generation
AbstractRecovering mission-critical systems from intrusion is very challenging, where fast and accurate damage assessment and recovery is vital to ensure business continuity. Existing intrusion recovery approaches mostly focus on a single abstraction ...
- ArticleMay 2013
TM-dietlibc: A TM-aware Real-World System Library
- Vesna Smiljkovic,
- Martin Nowack,
- Nebojsa Miletic,
- Timothy Harris,
- Osman Unsal,
- Adrian Cristal,
- Mateo Valero
IPDPS '13: Proceedings of the 2013 IEEE 27th International Symposium on Parallel and Distributed ProcessingPages 1266–1274https://doi.org/10.1109/IPDPS.2013.45The simplicity of concurrent programming with Transactional Memory (TM) and its recent implementation in mainstream processors greatly motivates researchers and industry to investigate this field and propose new implementations and optimizations. ...
- ArticleDecember 2012
Leveraging Cloud Infrastructure for Troubleshooting Edge Computing Systems
ICPADS '12: Proceedings of the 2012 IEEE 18th International Conference on Parallel and Distributed SystemsPages 440–447https://doi.org/10.1109/ICPADS.2012.67Modern cloud-based applications (e.g., Face book, Dropbox) serve a wide range of edge clients (e.g., laptops, smart phones). The clients' characteristics vary significantly in terms of hardware (e.g., high end desktop vs. resource constrained smart ...
- ArticleDecember 2011
A System Call Analysis Method with MapReduce for Malware Detection
ICPADS '11: Proceedings of the 2011 IEEE 17th International Conference on Parallel and Distributed SystemsPages 631–637https://doi.org/10.1109/ICPADS.2011.17System calls have long been used to profile a program as a malware. As previous system call based malware detection approaches are often process-oriented, which determines a process as a malware only by its invoking system calls, they often miss the ...