Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleDecember 2024JUST ACCEPTED
On Collaboration and Automation in the Context of Threat Detection and Response with Privacy-Preserving Features
- Lasse Nitz,
- Mehdi Akbari Gurabi,
- Milan Cermak,
- Martin Zadnik,
- David Karpuk,
- Arthur Drichel,
- Sebastian Schäfer,
- Benedikt Holmes,
- Avikarsha Mandal
Organizations and their security operation centers often struggle to detect and respond effectively to an extensive quantity of ever-evolving cyberattacks. While collaboration, such as threat intelligence sharing between security teams, and response ...
- research-articleDecember 2024
Fuzzing and Symbolic Execution for Multipath Malware Tracing: Bridging Theory and Practice via Survey and Experiments
Digital Threats: Research and Practice (DTRAP), Volume 5, Issue 4Article No.: 41, Pages 1–33https://doi.org/10.1145/3700147In real life, distinct runs of the same artifact lead to the exploration of different paths, due to either system’s natural randomness or malicious constructions. These variations might completely change execution outcomes (extreme case). Thus, to analyze ...
- research-articleDecember 2024
- research-articleDecember 2024
- research-articleDecember 2024
From Embodied Abuse to Mass Disruption: Generative, Inter-Reality Threats in Social, Mixed-Reality Platforms
Digital Threats: Research and Practice (DTRAP), Volume 5, Issue 4Article No.: 38, Pages 1–36https://doi.org/10.1145/3696015Extended Reality (XR) platforms can expose users to novel attacks including embodied abuse and/or AI attacks-at-scale. The expanded attack surfaces of XR technologies may expose users of shared online platforms to psychological/social and physiological ...
-
- research-articleDecember 2024
Advanced Persistent Threat Attack Detection Systems: A Review of Approaches, Challenges, and Trends
Digital Threats: Research and Practice (DTRAP), Volume 5, Issue 4Article No.: 39, Pages 1–37https://doi.org/10.1145/3696014Advanced persistent threat (APT) attacks present a significant challenge for any organization, as they are difficult to detect due to their elusive nature and characteristics. In this article, we conduct a comprehensive literature review to investigate ...
- research-articleDecember 2024
Investigating Threats Posed by SMS Origin Spoofing to IoT Devices
Digital Threats: Research and Practice (DTRAP), Volume 5, Issue 4Article No.: 36, Pages 1–12https://doi.org/10.1145/3696011The short message service (SMS) is a service for exchanging texts via mobile networks that has been developed not only as a means of text communication between subscribers but also as a means to remotely manage Internet of Things (IoT) devices. However, ...
- research-articleDecember 2024
- research-articleOctober 2024
Requirements for Playbook-Assisted Cyber Incident Response, Reporting and Automation
- Mehdi Akbari Gurabi,
- Lasse Nitz,
- Andrej Bregar,
- Jan Popanda,
- Christian Siemers,
- Roman Matzutt,
- Avikarsha Mandal
Digital Threats: Research and Practice (DTRAP), Volume 5, Issue 3Article No.: 34, Pages 1–11https://doi.org/10.1145/3688810Cybersecurity playbooks assume an increasingly important role as threat-specific documents for guiding operators in the context of cyber incident response. However, these playbooks are mostly unstructured or semi-structured, which significantly limits ...
- research-articleOctober 2024
The Hidden Threat: Analysis of Linux Rootkit Techniques and Limitations of Current Detection Tools
Digital Threats: Research and Practice (DTRAP), Volume 5, Issue 3Article No.: 28, Pages 1–24https://doi.org/10.1145/3688808This article addresses the significant threat posed by rootkits as part of the diverse malware landscape of today. Rootkits enable an attacker to regain access to an already comprised system at root-level making their prompt identification and removal ...
- research-articleOctober 2024
On NVD Users’ Attitudes, Experiences, Hopes, and Hurdles
Digital Threats: Research and Practice (DTRAP), Volume 5, Issue 3Article No.: 33, Pages 1–19https://doi.org/10.1145/3688806The National Vulnerability Database (NVD) is a major vulnerability database that is free to use for everyone. It provides information about vulnerabilities and further useful resources such as linked advisories and patches. The NVD is often considered as ...
- research-articleOctober 2024
InvesTEE: A TEE-supported Framework for Lawful Remote Forensic Investigations
Digital Threats: Research and Practice (DTRAP), Volume 5, Issue 3Article No.: 27, Pages 1–20https://doi.org/10.1145/3680294Remote forensic investigations, i.e., the covert lawful infiltration of computing devices, are a generic method to acquire evidence in the presence of strong defensive security. A precondition for such investigations is the ability to execute software ...
- research-articleOctober 2024
Does Cyber Insurance Promote Cyber Security Best Practice? An Analysis Based on Insurance Application Forms
Digital Threats: Research and Practice (DTRAP), Volume 5, Issue 3Article No.: 25, Pages 1–39https://doi.org/10.1145/3676283The significant rise in digital threats and attacks has led to an increase in the use of cyber insurance as a cyber risk treatment method intended to support organisations in the event of a security breach. Insurance providers are set up to assume such ...
- research-articleOctober 2024
Dead Man’s PLC: Towards Viable Cyber Extortion for Operational Technology
Digital Threats: Research and Practice (DTRAP), Volume 5, Issue 3Article No.: 23, Pages 1–24https://doi.org/10.1145/3670695For decades, operational technology (OT) has enjoyed the luxury of being suitably inaccessible, and thus has experienced directly targeted cyber attacks from only the most advanced and well-resourced adversaries. However, security via obscurity cannot ...
- research-articleOctober 2024
A Framework for Enhancing Social Media Misinformation Detection with Topical-Tactics
- Benjamin E. Bagozzi,
- Rajni Goel,
- Brunilda Lugo-de-Fabritz,
- Kelly Knickmeier-Cummings,
- Karthik Balasubramanian
Digital Threats: Research and Practice (DTRAP), Volume 5, Issue 3Article No.: 24, Pages 1–29https://doi.org/10.1145/3670694Recent years have seen advancements in machine learning methods for the detection of misinformation on social media. Yet, these methods still often ignore or improperly incorporate key information on the topical-tactics used by misinformation agents. To ...
- research-articleSeptember 2024JUST ACCEPTED
FedNIDS: A Federated Learning Framework for Packet-based Network Intrusion Detection System
Network intrusion detection systems (NIDS) play a critical role in discerning between benign and malicious network traffic. Deep neural networks (DNNs), anchored on large and diverse datasets, exhibit promise in enhancing the detection accuracy of NIDS by ...
- research-articleSeptember 2024
CuMONITOR: Continuous Monitoring of Microarchitecture for Software Task Identification and Classification
Digital Threats: Research and Practice (DTRAP), Volume 5, Issue 3Article No.: 22, Pages 1–22https://doi.org/10.1145/3652861The interactions between software and hardware are increasingly important to computer system security. This research collected microprocessor control signal sequences to develop machine learning models that identify software tasks. In contrast with prior ...
- research-articleSeptember 2024
ADAPT: Adaptive Camouflage Based Deception Orchestration For Trapping Advanced Persistent Threats
- Venkata Sai Charan Putrevu,
- Subhasis Mukhopadhyay,
- Subhajit Manna,
- Nanda Rani,
- Ansh Vaid,
- Hrushikesh Chunduri,
- Mohan Anand Putrevu,
- Sandeep Shukla
Digital Threats: Research and Practice (DTRAP), Volume 5, Issue 3Article No.: 21, Pages 1–35https://doi.org/10.1145/3651991Honeypots serve as a valuable deception technology, enabling security teams to gain insights into the behaviour patterns of attackers and investigate cyber security breaches. However, traditional honeypots prove ineffective against advanced adversaries ...
- research-articleSeptember 2024JUST ACCEPTED
Automated ATT&CK Technique Chaining
Incident response teams need to determine what happened before and after an observation of adversary behavior in order to effectively respond to incidents. The MITRE ATT&CK knowledge base provides useful information about adversary behaviors, but provides ...
- research-articleJuly 2024JUST ACCEPTED
Unveiling Cyber Threat Actors: A Hybrid Deep Learning Approach for Behavior-based Attribution
In this paper, we leverage natural language processing and machine learning algorithms to profile threat actors based on their behavioral signatures to establish identification for soft attribution. Our unique dataset comprises various actors and the ...