Please login to be able to save your searches and receive alerts for new content matching your search criteria.
Security represents one of the crucial concerns when it comes to DevOps methodology-empowered software development and service delivery process. Considering the adoption of Infrastructure as Code (IaC), even minor flaws could potentially cause fatal ...
Information systems that support interaction with users, especially social applications, when there are many functions, may omit the filtering of user input data due to functional cross-reference and improper switch logic settings. It leads to a series ...
American Fuzzy Lop (AFL) is one of the most widely used overlay-oriented fuzzers in the field of fuzz processing. In the process of analyzing AFL, we found that the number of tests per code block in the AFL testing process is very unevenly distributed. ...
VPN traffic identification under HTTPS tunnel is an urgent problem in the field of network security and network management. In the research scenario of TLS encrypted VPN traffic, the existing work mainly focuses on the classification of traffic ...
Privacy and security are complex topics, raising a variety of considerations and requirements that can be challenging to implement in software development. Determining the security and privacy-related factors that have an influence on software systems ...
This report describes the artifacts of the “Dissecting American Fuzzy Lop – A FuzzBench Evaluation” paper. The artifacts are available online at and archived at . ...
The sharing of information between older adults and their friends, families, caregivers, and doctors promotes a collaborative approach to managing their emotional, mental, and physical well-being and health, prolonging independent living, and improving ...
The linkage of records to identify common entities across multiple data sources has gained increasing interest over the last few decades. In the absence of unique entity identifiers, quasi-identifying attributes such as personal names and addresses are ...
It is well-known that most users do not read privacy policies, but almost always tick the box to agree with them. While the length and readability of privacy policies have been well studied, and many approaches for policy analysis based on natural ...
Deep neural networks are vulnerable to adversarial examples, even in the black-box setting where the attacker is only accessible to the model output. Recent studies have devised effective black-box attacks with high query efficiency. However, such ...
In this paper we enhance the EasyCrypt proof assistant to reason about computational complexity of adversaries. The key technical tool is a Hoare logic for reasoning about computational complexity (execution time and oracle calls) of adversarial ...
As an essential component responsible for communication, network services are security-critical, and it is vital to find vulnerabilities in them. Fuzzing is currently one of the most popular software vulnerability discovery techniques, widely adopted due ...
Assurance techniques such as adversary-centric security testing are an essential part of the risk assessment process for improving risk mitigation and response capabilities against cyber attacks. While the use of these techniques, including vulnerability ...
Cyber attacks are omnipresent and their rapid detection is crucial for system security. Signature-based intrusion detection monitors systems for attack indicators and plays an important role in recognizing and preventing such attacks. Unfortunately, it is ...
With wide adaptation of open-source Android into mobile devices by different device vendors, sophisticated malware are developed to exploit security vulnerabilities. As comprehensive security analysis on physical devices are impractical and costly, ...
We propose APTHunter, a system for prompt detection of Advanced and Persistent Threats (APTs) in early stages. We provide an approach for representing the indicators of compromise that appear in the cyber threat intelligence reports and the relationships ...
Existing centralized deep learning methods get surprising success in traffic flow prediction based on large-scale datasets. However, to protect the privacy of datasets, organizations are not allowed to share local datasets, which causes data exists as ...
The last decade, the evolution in quantum computing has been enormous and real and reliable quantum computers are being developed quickly. One of the consequences of the upcoming quantum era is to make key distribution protocols insecure, as most of ...
With the explosion of COVID-19 cases and the government’s needs to control virus spreading, the development of effective and robust systems for managing vaccination certificates to restrict citizens’ activities has been in the centre of many ...
Watermarking is a method for the verification of the authenticity of a digital object. In this work we investigate the watermarking of audio signals utilizing watermarked images. We present a multiple watermarking scheme for the watermarking of digital ...