Bin2vec: learning representations of binary executable programs for security tasksCybersecurity - Tập 4 - Trang 1-14 - 2021
Shushan Arakelyan, Sima Arasteh, Christophe Hauser, Erik Kline, Aram Galstyan
Tackling binary program analysis problems has traditionally implied manually defining rules and heuristics, a tedious and time consuming task for human analysts. In order to improve automation and scalability, we propose an alternative direction based on distributed representations of binary programs with applicability to a number of downstream tasks. We introduce Bin2vec, a new approach leveragin...... hiện toàn bộ
Towards IP geolocation with intermediate routers based on topology discoveryCybersecurity - Tập 2 - Trang 1-14 - 2019
Zhihao Wang, Hong Li, Qiang Li, Wei Li, Hongsong Zhu, Limin Sun
IP geolocation determines geographical location by the IP address of Internet hosts. IP geolocation is widely used by target advertising, online fraud detection, cyber-attacks attribution and so on. It has gained much more attentions in these years since more and more physical devices are connected to cyberspace. Most geolocation methods cannot resolve the geolocation accuracy for those devices wi...... hiện toàn bộ
ELAID: detecting integer-Overflow-to-Buffer-Overflow vulnerabilities by light-weight and accurate static analysisCybersecurity - Tập 3 - Trang 1-19 - 2020
Lili Xu, Mingjie Xu, Feng Li, Wei Huo
The Integer-Overflow-to-Buffer-Overflow (IO2BO) vulnerability has been widely exploited by attackers to cause severe damages to computer systems. Automatically identifying this kind of vulnerability is critical for software security. Despite many works have been done to mitigate integer overflow, existing tools either report large number of false positives or introduce unacceptable time consumptio...... hiện toàn bộ
Practical pairing-Free sensor cooperation scheme for cloud-Assisted wireless body area networksCybersecurity - Tập 3 - Trang 1-9 - 2020
Yuanzhao Song, Haowen Tan
Nowadays, the design and construction of efficient internet of things (IoTs) has become a new strategies for improving living quality of all aspects. Emerging as one of the most significant extension of medical IoTs, wireless body area networks (WBANs) is capable of monitoring crucial physiological and behavioral information through wearable sensors, offering a new paradigm for the next-generation...... hiện toàn bộ
Graph neural network based approach to automatically assigning common weakness enumeration identifiers for vulnerabilitiesCybersecurity - Tập 6 - Trang 1-15 - 2023
Peng Liu, Wenzhe Ye, Haiying Duan, Xianxian Li, Shuyi Zhang, Chuanjian Yao, Yongnan Li
Vulnerability reports are essential for improving software security since they record key information on vulnerabilities. In a report, CWE denotes the weakness of the vulnerability and thus helps quickly understand the cause of the vulnerability. Therefore, CWE assignment is useful for categorizing newly discovered vulnerabilities. In this paper, we propose an automatic CWE assignment method with ...... hiện toàn bộ
Time sensitive networking security: issues of precision time protocol and its implementationCybersecurity - Tập 6 - Trang 1-13 - 2023
Davide Berardi, Nils O. Tippenhauer, Andrea Melis, Marco Prandini, Franco Callegati
Time Sensitive Networking (TSN) will be an integral component of industrial networking. Time synchronization in TSN is provided by the IEEE-1588, Precision Time Protocol (PTP) protocol. The standard, dating back to 2008, marginally addresses security aspects, notably not encompassing the frames designed for management purposes (Type Length Values or TLVs). In this work we show that the TLVs can be...... hiện toàn bộ
Identifying high-risk over-entitlement in access control policies using fuzzy logicCybersecurity - Tập 5 Số 1 - Trang 1-17 - 2022
Parkinson, Simon, Khana, Saad
Analysing access control policies is an essential process for ensuring over-prescribed permissions are identified and removed. This is a time-consuming and knowledge-intensive process, largely because there is a wealth of policy information that needs to be manually examined. Furthermore, there is no standard definition of what constitutes an over-entitled permission within an organisation’s acces...... hiện toàn bộ