Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- surveyNovember 2024
A Survey on Advanced Persistent Threat Detection: A Unified Framework, Challenges, and Countermeasures
ACM Computing Surveys (CSUR), Volume 57, Issue 3Article No.: 62, Pages 1–36https://doi.org/10.1145/3700749In recent years, frequent Advanced Persistent Threat (APT) attacks have caused disastrous damage to critical facilities, leading to severe information leakages, economic losses, and even social disruptions. Via sophisticated, long-term, and stealthy ...
- research-articleOctober 2024
Causal Inconsistencies Are Normal in Windows Memory Dumps (Too)
Digital Threats: Research and Practice (DTRAP), Volume 5, Issue 3Article No.: 31, Pages 1–20https://doi.org/10.1145/3680293Main memory contains valuable information for criminal investigations, e.g., process information or keys for disk encryption. Taking snapshots of memory is therefore common practice during a digital forensic examination. Inconsistencies in such memory ...
- surveyFebruary 2024
Security for Machine Learning-based Software Systems: A Survey of Threats, Practices, and Challenges
ACM Computing Surveys (CSUR), Volume 56, Issue 6Article No.: 151, Pages 1–38https://doi.org/10.1145/3638531The rapid development of Machine Learning (ML) has demonstrated superior performance in many areas, such as computer vision and video and speech recognition. It has now been increasingly leveraged in software systems to automate the core tasks. However, ...
- research-articleAugust 2024
Net-GPT: A LLM-Empowered Man-in-the-Middle Chatbot for Unmanned Aerial Vehicle
- Brett Piggott,
- Siddhant Patil,
- Guohuan Feng,
- Ibrahim Odat,
- Rajdeep Mukherjee,
- Balakrishnan Dharmalingam,
- Anyi Liu
SEC '23: Proceedings of the Eighth ACM/IEEE Symposium on Edge ComputingPages 287–293https://doi.org/10.1145/3583740.3626809In the dynamic realm of AI, integrating Large Language Models (LLMs) with security systems reshape cybersecurity. LLMs bolster defense against cyber threats but also introduce risks, aiding adversaries in generating malicious content, discovering ...
- ArticleJanuary 2024
Software Mitigation of RISC-V Spectre Attacks
Innovative Security Solutions for Information Technology and CommunicationsPages 51–64https://doi.org/10.1007/978-3-031-52947-4_5AbstractSpeculative attacks are still an active threat today that, even if initially focused on the x86 platform, reach across all modern hardware architectures. RISC-V is a newly proposed open instruction set architecture that has seen traction from both ...
-
- research-articleNovember 2023
Secure and Timely GPU Execution in Cyber-physical Systems
CCS '23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications SecurityPages 2591–2605https://doi.org/10.1145/3576915.3623197Graphics Processing Units (GPU) are increasingly deployed on Cyber-physical Systems (CPSs), frequently used to perform real-time safety-critical functions, such as object detection on autonomous vehicles. As a result, availability is important for GPU ...
- research-articleJuly 2023
A Survey on Automated Driving System Testing: Landscapes and Trends
- Shuncheng Tang,
- Zhenya Zhang,
- Yi Zhang,
- Jixiang Zhou,
- Yan Guo,
- Shuang Liu,
- Shengjian Guo,
- Yan-Fu Li,
- Lei Ma,
- Yinxing Xue,
- Yang Liu
ACM Transactions on Software Engineering and Methodology (TOSEM), Volume 32, Issue 5Article No.: 124, Pages 1–62https://doi.org/10.1145/3579642Automated Driving Systems (ADS) have made great achievements in recent years thanks to the efforts from both academia and industry. A typical ADS is composed of multiple modules, including sensing, perception, planning, and control, which brings together ...
- surveyJuly 2023
The Security in Optical Wireless Communication: A Survey
ACM Computing Surveys (CSUR), Volume 55, Issue 14sArticle No.: 329, Pages 1–36https://doi.org/10.1145/3594718With the demand for economical and high-speed wireless services, Optical Wireless Communication (OWC) has attracted increasing attention in both research and the market. In the past decades, numerous optical-related techniques (e.g., LEDs, displays, ...
- ArticleAugust 2023
Retrofitting AMD x86 Processors with Active Virtual Machine Introspection Capabilities
AbstractActive virtual machine introspection mechanisms intercept the control flow of a virtual machine running on top of a hypervisor. They enable external tools to monitor and inspect the state at predetermined locations of interest synchronous to the ...
- research-articleMarch 2023
Cyber Arena: An Open-Source Solution for Scalable Cybersecurity Labs in the Cloud
SIGCSE 2023: Proceedings of the 54th ACM Technical Symposium on Computer Science Education V. 1Pages 221–227https://doi.org/10.1145/3545945.3569828Numerous institutions are developing cybersecurity education and training programs to supply the considerable global demand for cybersecurity professionals. However, these institutions face barriers in building realistic laboratory environments, commonly ...
- research-articleJanuary 2023
Research on system safety in the case of component failure based on degree correlation
International Journal of Security and Networks (IJSN), Volume 18, Issue 2Pages 65–74https://doi.org/10.1504/ijsn.2023.131585Nowadays, complex systems play an irreplaceable role in life, and the security of complex systems has always been the focus of research. In this paper, we focus on the topological characteristics of the network, starting from the degree correlation of the ...
- research-articleNovember 2022
Breaking Cellular IoT with Forged Data-plane Signaling: Attacks and Countermeasure
ACM Transactions on Sensor Networks (TOSN), Volume 18, Issue 4Article No.: 59, Pages 1–26https://doi.org/10.1145/3534124We devise new attacks exploiting the unprotected data-plane signaling in cellular IoT networks (a.k.a. both NB-IoT and Cat-M). We show that, despite the deployed security mechanisms on both control-plane signaling and data-plane packet forwarding, novel ...
HearMeOut: detecting voice phishing activities in Android
MobiSys '22: Proceedings of the 20th Annual International Conference on Mobile Systems, Applications and ServicesPages 422–435https://doi.org/10.1145/3498361.3538939In South Korea, voice phishing has been proliferating with the advent of voice phishing apps: the number of annual victims had risen to 34,527 in 2020, representing financial losses of approximately 598 million USD. However, the voice phishing ...
- research-articleJanuary 2022
Fault Injection for Linux Device Drivers on x86, MIPS and ARM Architectures
Procedia Computer Science (PROCS), Volume 204, Issue CPages 99–107https://doi.org/10.1016/j.procs.2022.08.012AbstractThe security of device drivers should be verified by system testing. This paper presents QDFaultInjector, a fault injection tool that can work on three architectures (x86 64, AArch64 and MIPS64) to test Linux kernel modules (including device ...
- research-articleNovember 2021
Live Migration of Operating System Containers in Encrypted Virtual Machines
CCSW '21: Proceedings of the 2021 on Cloud Computing Security WorkshopPages 125–137https://doi.org/10.1145/3474123.3486761With the widespread use of Docker and Kubernetes, OS-level virtualization has become a key technology to deploy and run software. At the same time, data centers and cloud providers offer shared computing resources on demand. The use of these resources ...
- research-articleJuly 2021
A Survey on Windows-based Ransomware Taxonomy and Detection Mechanisms
ACM Computing Surveys (CSUR), Volume 54, Issue 6Article No.: 117, Pages 1–36https://doi.org/10.1145/3453153Ransomware remains an alarming threat in the 21st century. It has evolved from being a simple scare tactic into a complex malware capable of evasion. Formerly, end-users were targeted via mass infection campaigns. Nevertheless, in recent years, the ...
- research-articleJanuary 2021
Security model and design of network communication system based on data encryption algorithm
International Journal of Autonomous and Adaptive Communications Systems (IJAACS), Volume 14, Issue 1-2Pages 83–97https://doi.org/10.1504/ijaacs.2021.114278Implementing cryptographic services based on network communication systems, improving data encryption algorithms, and providing basic support for secure communication technologies use homomorphic encryption to secure network communications systems data ...
- research-articleAugust 2020
Security impacts of sub-optimal DevSecOps implementations in a highly regulated environment
ARES '20: Proceedings of the 15th International Conference on Availability, Reliability and SecurityArticle No.: 63, Pages 1–8https://doi.org/10.1145/3407023.3409186This work presents lessons learned from a multi-year support effort of a large and well-funded software development project. The focus is on the security impacts to the DevSecOps culture, process, and pipeline. These impacts stem from faulty ...
- research-articleAugust 2020
Subverting Linux' integrity measurement architecture
ARES '20: Proceedings of the 15th International Conference on Availability, Reliability and SecurityArticle No.: 27, Pages 1–10https://doi.org/10.1145/3407023.3407058Integrity is a key protection objective in the context of system security. This holds for both hardware and software. Since hardware cannot be changed after its manufacturing process, the manufacturer must be trusted to build it properly. However, it is ...
- research-articleJune 2020
Performance evaluation and security analysis of ground‐to‐satellite FSO system with CV‐QKD protocol
IET Communications (CMU2), Volume 14, Issue 10Pages 1534–1542https://doi.org/10.1049/iet-com.2019.0795This study evaluates the performance of a secure ground‐to‐satellite free‐space optical (FSO) system using a bipolar pulse amplitude modulation over modulated gamma fading channel. A closed‐form expression is derived for the joint probability of a ...