Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleSeptember 2024
CuMONITOR: Continuous Monitoring of Microarchitecture for Software Task Identification and Classification
Digital Threats: Research and Practice (DTRAP), Volume 5, Issue 3Article No.: 22, Pages 1–22https://doi.org/10.1145/3652861The interactions between software and hardware are increasingly important to computer system security. This research collected microprocessor control signal sequences to develop machine learning models that identify software tasks. In contrast with prior ...
- research-articleMarch 2024
Towards Attack Detection in Multimodal Cyber-Physical Systems with Sticky HDP-HMM based Time Series Analysis
Digital Threats: Research and Practice (DTRAP), Volume 5, Issue 1Article No.: 5, Pages 1–21https://doi.org/10.1145/3604434Automatic detection of the precise occurrence and duration of an attack reflected in time-series logs generated by cyber-physical systems is a challenging problem. This problem is exacerbated when performing this analysis using logs with limited system ...
- research-articleDecember 2022
Emerging Cybersecurity Capability Gaps in the Industrial Internet of Things: Overview and Research Agenda
- Louise Axon,
- Katherine Fletcher,
- Arianna Schuler Scott,
- Marcel Stolz,
- Robert Hannigan,
- Ali El Kaafarani,
- Michael Goldsmith,
- Sadie Creese
Digital Threats: Research and Practice (DTRAP), Volume 3, Issue 4Article No.: 34, Pages 1–27https://doi.org/10.1145/3503920Internet of Things (IoT)-enabled devices are becoming integrated into a significant and increasing proportion of critical infrastructures, changing the cybersecurity-risk landscape. Risk is being introduced to industry sectors such as transport, energy, ...
- research-articleMay 2022
Active and Passive Collection of SSH Key Material for Cyber Threat Intelligence
Digital Threats: Research and Practice (DTRAP), Volume 3, Issue 3Article No.: 19, Pages 1–5https://doi.org/10.1145/3491262This article describes a system for storing historical forensic artifacts collected from SSH connections. This system exposes a REST API in a similar fashion as passive DNS databases, malware hash registries, and SSL notaries with the goal of supporting ...
- research-articleFebruary 2022
Classifying Co-resident Computer Programs Using Information Revealed by Resource Contention
Digital Threats: Research and Practice (DTRAP), Volume 4, Issue 2Article No.: 17, Pages 1–29https://doi.org/10.1145/3464306Modern computer architectures are complex, containing numerous components that can unintentionally reveal system operating properties. Defensive security professionals seek to minimize this kind of exposure while adversaries can leverage the data to ...
- research-articleOctober 2021
Results From Invoking Artificial Neural Networks to Measure Insider Threat Detection & Mitigation
Digital Threats: Research and Practice (DTRAP), Volume 3, Issue 1Article No.: 3, Pages 1–20https://doi.org/10.1145/3457909Advances on differentiating between malicious intent and natural “organizational evolution” to explain observed anomalies in operational workplace patterns suggest benefit from evaluating collective behaviors observed in the facilities to improve insider ...
- research-articleOctober 2021
Deception in Network Defences Using Unpredictability
Digital Threats: Research and Practice (DTRAP), Volume 2, Issue 4Article No.: 29, Pages 1–26https://doi.org/10.1145/3450973In this article, we propose a novel method that aims to improve upon existing moving-target defences by making them unpredictably reactive using probabilistic decision-making. We postulate that unpredictability can improve network defences in two key ...
- research-articleJune 2021
ExSol: Collaboratively Assessing Cybersecurity Risks for Protecting Energy Delivery Systems
Digital Threats: Research and Practice (DTRAP), Volume 2, Issue 3Article No.: 21, Pages 1–23https://doi.org/10.1145/3428156No longer just prophesied about, cyber-attacks to Energy Delivery Systems (EDS) (e.g., the power grid, gas and oil industries) are now very real dangers that result in non-trivial economical losses and inconveniences to modern societies. In such a ...
- research-articleJanuary 2021
Stealthy Attacks against Robotic Vehicles Protected by Control-based Intrusion Detection Techniques
Digital Threats: Research and Practice (DTRAP), Volume 2, Issue 1Article No.: 7, Pages 1–25https://doi.org/10.1145/3419474Robotic vehicles (RV) are increasing in adoption in many industrial sectors. RVs use auto-pilot software for perception and navigation and rely on sensors and actuators for operating autonomously in the physical world. Control algorithms have been used ...