default search action
Digital Threats: Research and Practice, Volume 4
Volume 4, Number 1, March 2023
- Henry Howland:
CVSS: Ubiquitous and Broken. 1:1-1:12 - Ricardo Alejandro Manzano Sanchez, Kshirasagar Naik, Abdurhman Albasir, Marzia Zaman, Nishith Goel:
Detection of Anomalous Behavior of Smartphone Devices using Changepoint Analysis and Machine Learning Techniques. 2:1-2:28 - Behnam Shobiri, Mohammad Mannan, Amr M. Youssef:
CDNs' Dark Side: Security Problems in CDN-to-Origin Connections. 3:1-3:22 - Ya Xiao, Yang Zhao, Nicholas Allen, Nathan Keynes, Danfeng (Daphne) Yao, Cristina Cifuentes:
Industrial Experience of Finding Cryptographic Vulnerabilities in Large-scale Codebases. 4:1-4:18 - Stefano Carnà, Serena Ferracci, Francesco Quaglia, Alessandro Pellegrini:
Fight Hardware with Hardware: Systemwide Detection and Mitigation of Side-channel Attacks Using Performance Counters. 5:1-5:24 - Maksim Ekin Eren, Juston S. Moore, Erik Skau, Elisabeth Moore, Manish Bhattarai, Gopinath Chennupati, Boian S. Alexandrov:
General-purpose Unsupervised Cyber Anomaly Detection via Non-negative Tensor Factorization. 6:1-6:28 - Dimitrios Georgoulias, Jens Myrup Pedersen, Morten Falch, Emmanouil Vasilomanolakis:
COVID-19 Vaccination Certificates in the Darkweb. 7:1-7:17 - Giovanni Apruzzese, Pavel Laskov, Edgardo Montes de Oca, Wissam Mallouli, Luis Burdalo Rapa, Athanasios Vasileios Grammatopoulos, Fabio Di Franco:
The Role of Machine Learning in Cybersecurity. 8:1-8:38 - Mengfei Ren, Xiaolei Ren, Huadong Feng, Jiang Ming, Yu Lei:
Security Analysis of Zigbee Protocol Implementation via Device-agnostic Fuzzing. 9:1-9:24 - Luis Puche Rondon, Leonardo Babun, Ahmet Aris, Kemal Akkaya, A. Selcuk Uluagac:
LGuard: Securing Enterprise-IoT Systems against Serial-Based Attacks via Proprietary Communication Buses. 10:1-10:26 - Moustafa Mahmoud, Mohammad Mannan, Amr M. Youssef:
APTHunter: Detecting Advanced Persistent Threats in Early Stages. 11:1-11:31 - Max Landauer, Markus Wurzenberger, Florian Skopik, Wolfgang Hotwagner, Georg Höld:
AMiner: A Modular Log Data Analysis Pipeline for Anomaly-based Intrusion Detection. 12:1-12:16 - Saurabh Kumar, Debadatta Mishra, Biswabandan Panda, Sandeep Kumar Shukla:
InviSeal: A Stealthy Dynamic Analysis Framework for Android Systems. 13:1-13:31 - Alexander Staves, Antonios Gouglidis, David Hutchison:
An Analysis of Adversary-Centric Security Testing within Information and Operational Technology Environments. 14:1-14:29
- Alan Levine, Brett Alan Tucker:
Zero Trust Architecture: Risk Discussion. 15:1-15:6
Volume 4, Number 2, June 2023
- Aydin Aysu, Scott R. Graham:
Introduction to the Special Issue on the Digital Threats of Hardware Security. 16:1-16:2 - Tor J. Langehaug, Brett J. Borghetti, Scott R. Graham:
Classifying Co-resident Computer Programs Using Information Revealed by Resource Contention. 17:1-17:29 - Lionel Morel, Damien Couroussé, Thomas Hiscock:
Code Polymorphism Meets Code Encryption: Confidentiality and Side-channel Protection of Software Components. 18:1-18:27 - Karim Lounis, Mohammad Zulkernine:
Lessons Learned: Analysis of PUF-based Authentication Protocols for IoT. 19:1-19:33 - Girish Vaidya, T. V. Prabhakar, Nithish K. Gnani, Ryan Shah, Shishir Nagaraja:
Sensor Identification via Acoustic Physically Unclonable Function. 20:1-20:25 - Huili Chen, Cheng Fu, Jishen Zhao, Farinaz Koushanfar:
GALU: A Genetic Algorithm Framework for Logic Unlocking. 21:1-21:30 - Abdurhman Albasir, Kshirasagar Naik, Ricardo Manzano:
Toward Improving the Security of IoT and CPS Devices: An AI Approach. 22:1-22:30
- S. S. Iyengar, Bhavani Thuraisingham, Marek Zmuda:
Special Issue on Actionable Information for Digital Threat Discovery Using Contextualized Data or Multi Sensor Data Fusion. 23:1-23:2 - Jonathan Oakley, Carl R. Worley, Lu Yu, Richard R. Brooks, Ilker Özçelik, Anthony Skjellum, Jihad S. Obeid:
Scrybe: A Secure Audit Trail for Clinical Trial Data Fusion. 24:1-24:20 - Poushali Sengupta, Sudipta Paul, Subhankar Mishra:
BUDS+: Better Privacy with Converger and Noisy Shuffling. 25:1-25:23
- Fran Casino, Nikolaos Totosis, Theodoros Apostolopoulos, Nikolaos Lykousas, Constantinos Patsakis:
Analysis and Correlation of Visual Evidence in Campaigns of Malicious Office Documents. 26:1-26:19 - Robert A. Bridges, Sean Oesch, Michael D. Iannacone, Kelly M. T. Huffer, Brian Jewell, Jeffrey A. Nichols, Brian Weber, Miki E. Verma, Daniel Scofield, Craig Miles, Thomas Plummer, Mark Daniell, Anne M. Tall, Justin M. Beaver, Jared M. Smith:
Beyond the Hype: An Evaluation of Commercially Available Machine Learning-based Malware Detectors. 27:1-27:22 - Rajat Subhra Bhowmick, Rahul Indra, Isha Ganguli, Jayanta Paul, Jaya Sil:
Breaking Captcha System with Minimal Exertion through Deep Learning: Real-time Risk Assessment on Indian Government Websites. 28:1-28:24 - Thomas Walshe, Andrew Simpson:
Towards a Greater Understanding of Coordinated Vulnerability Disclosure Policy Documents. 29:1-29:36 - Pierre Graux, Jean-François Lalande, Valérie Viet Triem Tong, Pierre Wilke:
OATs'inside: Retrieving Object Behaviors From Native-based Obfuscated Android Applications. 30:1-30:27
Volume 4, Number 3, September 2023
- Andreas Dewald, Thomas Schreck:
Introduction to the IMF 2023 Special Issue. 31:1-31:2 - Andreas Hammer, Mathis Ohlig, Julian Geus, Felix C. Freiling:
A Functional Classification of Forensic Access to Storage and its Legal Implications. 32:1-32:14 - Jan Gruber, Merlin Humml:
A Formal Treatment of Expressiveness and Relevanceof Digital Evidence. 33:1-33:16 - Samantha Klier, Jan Varenkamp, Harald Baier:
Back and Forth - On Automatic Exposure of Origin and Dissemination of Files on Windows. 34:1-34:17 - Edita Bajramovic, Christofer Fein, Marius Frinken, Paul Rösler, Felix C. Freiling:
LAVA: Log Authentication and Verification Algorithm. 35:1-35:17 - Tobias Hilbig, Thomas Geras, Erwin Kupris, Thomas Schreck:
security.txt Revisited: Analysis of Prevalence and Conformity in 2022. 36:1-36:17 - Florian Bausch, Andreas Dewald:
Forensic Examination of Ceph. 37:1-37:18 - Thomas Göbel, Harald Baier, Frank Breitinger:
Data for Digital Forensics: Why a Discussion on "How Realistic is Synthetic Data" is Dispensable. 38:1-38:18
- Marcus Botacin, Uriel Kosayev, Ruimin Sun:
Introduction to the Special Issue on Memory-Based Malware and Other Unconventional Threats. 39:1 - Anthony Rose, Scott R. Graham, Jacob J. Krasnov:
IronNetInjector: Weaponizing .NET Dynamic Language Runtime Engines. 40:1-40:23 - Oleg Boyarchuk, Sebastiano Mariani, Stefano Ortolani, Giovanni Vigna:
Keeping Up with the Emotets: Tracking a Multi-infrastructure Botnet. 41:1-41:29
- Shreyas Srinivasa, Jens Myrup Pedersen, Emmanouil Vasilomanolakis:
Gotta Catch 'em All: A Multistage Framework for Honeypot Fingerprinting. 42:1-42:28 - P. Mohan Anand, P. V. Sai Charan, Sandeep K. Shukla:
HiPeR - Early Detection of a Ransomware Attack using Hardware Performance Counters. 43:1-43:24 - Mattia Falduti, Sergio Tessaris:
Mapping the Interdisciplinary Research on Non-consensual Pornography: Technical and Quantitative Perspectives. 44:1-44:22 - Sharifah Roziah Binti Mohd Kassim, Shujun Li, Budi Arief:
Understanding How National CSIRTs Evaluate Cyber Incident Response Tools and Data: Findings from Focus Group Discussions. 45:1-45:24 - Kibreab Adane, Berhanu Beyene, Mohammed Abebe Yimer:
Single and Hybrid-Ensemble Learning-Based Phishing Website Detection: Examining Impacts of Varied Nature Datasets and Informative Feature Selection Technique. 46:1-46:27
Volume 4, Number 4, December 2023
- Angel Hueca, Sharon Mudd, Timothy J. Shimeall:
Introduction to the Special Issue on Information Sharing. 47:1-47:2 - Martin Husák, Pavol Sokol, Martin Zádník, Václav Bartos, Martin Horák:
Lessons Learned from Automated Sharing of Intrusion Detection Alerts: The Case of the SABU Platform. 48:1-48:11 - Kate Connolly, Anna Klempay, Mary McCann, Paul R. Brenner:
Dark Web Marketplaces: Data for Collaborative Threat Intelligence. 49:1-49:12 - Antonios Xenakis, Sabrina Mamtaz Nourin, Zhiyuan Chen, George Karabatis, Ahmed Aleroud, Jhancy Amarsingh:
A Self-adaptive and Secure Approach to Share Network Trace Data. 50:1-50:20
- Budi Arief, Lena Yuryna Connolly, Julio C. Hernandez-Castro, Allan Liska, Peter Y. A. Ryan:
Introduction to the Special Issue on Ransomware. 51:1-51:3 - Michael Lang, Lena Yuryna Connolly, Paul Taylor, Phillip J. Corner:
The Evolving Menace of Ransomware: A Comparative Analysis of Pre-pandemic and Mid-pandemic Attacks. 52:1-52:22 - Yagiz Yilmaz, Orçun Çetin, Claudia Grigore, Budi Arief, Julio C. Hernandez-Castro:
Personality Types and Ransomware Victimisation. 53:1-53:25 - Michael Mundt, Harald Baier:
Threat-Based Simulation of Data Exfiltration Toward Mitigating Multiple Ransomware Extortions. 54:1-54:23 - Louise Axon, Arnau Erola, Ioannis Agrafiotis, Ganbayar Uuganbayar, Michael Goldsmith, Sadie Creese:
Ransomware as a Predator: Modelling the Systemic Risk to Prey. 55:1-55:38 - Anna Cartwright, Edward J. Cartwright:
The Economics of Ransomware Attacks on Integrated Supply Chain Networks. 56:1-56:14 - Pranshu Bajpai, Richard J. Enbody:
Know Thy Ransomware Response: A Detailed Framework for Devising Effective Ransomware Response Strategies. 57:1-57:19
- Koen van Hove, Jeroen van der Ham-de Vos, Roland van Rijswijk-Deij:
rpkiller: Threat Analysis of the BGP Resource Public Key Infrastructure. 58:1-58:24 - David Allison, Kieran McLaughlin, Paul Smith:
Goosewolf: An Embedded Intrusion Detection System for Advanced Programmable Logic Controllers. 59:1-59:19
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.