Journal of Computer Virology and Hacking Techniques最新文献

筛选
英文 中文
A vehicle firmware security vulnerability: an IVI exploitation 车辆固件安全漏洞:IVI 利用
IF 1.5
Journal of Computer Virology and Hacking Techniques Pub Date : 2024-05-08 DOI: 10.1007/s11416-024-00522-4
Gianpiero Costantino, Marco De Vincenzi, Ilaria Matteucci
{"title":"A vehicle firmware security vulnerability: an IVI exploitation","authors":"Gianpiero Costantino, Marco De Vincenzi, Ilaria Matteucci","doi":"10.1007/s11416-024-00522-4","DOIUrl":"https://doi.org/10.1007/s11416-024-00522-4","url":null,"abstract":"","PeriodicalId":15545,"journal":{"name":"Journal of Computer Virology and Hacking Techniques","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2024-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141000417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sniping at web applications to discover input-handling vulnerabilities 狙击网络应用程序,发现输入处理漏洞
IF 1.5
Journal of Computer Virology and Hacking Techniques Pub Date : 2024-04-12 DOI: 10.1007/s11416-024-00518-0
Ciro Brandi, G. Perrone, S. Romano
{"title":"Sniping at web applications to discover input-handling vulnerabilities","authors":"Ciro Brandi, G. Perrone, S. Romano","doi":"10.1007/s11416-024-00518-0","DOIUrl":"https://doi.org/10.1007/s11416-024-00518-0","url":null,"abstract":"","PeriodicalId":15545,"journal":{"name":"Journal of Computer Virology and Hacking Techniques","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2024-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140711079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Some remarks on how to hash faster onto elliptic curves 关于如何在椭圆曲线上更快散列的一些评论
IF 1.5
Journal of Computer Virology and Hacking Techniques Pub Date : 2024-03-18 DOI: 10.1007/s11416-024-00514-4
D. Koshelev
{"title":"Some remarks on how to hash faster onto elliptic curves","authors":"D. Koshelev","doi":"10.1007/s11416-024-00514-4","DOIUrl":"https://doi.org/10.1007/s11416-024-00514-4","url":null,"abstract":"","PeriodicalId":15545,"journal":{"name":"Journal of Computer Virology and Hacking Techniques","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2024-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140233560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Use of hybrid post-quantum key exchange in internet protocols 在互联网协议中使用混合后量子密钥交换技术
IF 1.5
Journal of Computer Virology and Hacking Techniques Pub Date : 2024-03-16 DOI: 10.1007/s11416-024-00515-3
Valery Smyslov
{"title":"Use of hybrid post-quantum key exchange in internet protocols","authors":"Valery Smyslov","doi":"10.1007/s11416-024-00515-3","DOIUrl":"https://doi.org/10.1007/s11416-024-00515-3","url":null,"abstract":"","PeriodicalId":15545,"journal":{"name":"Journal of Computer Virology and Hacking Techniques","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2024-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140236759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
“Dirclustering”: a semantic clustering approach to optimize website structure discovery during penetration testing "Dirclustering":在渗透测试过程中优化网站结构发现的语义聚类方法
IF 1.5
Journal of Computer Virology and Hacking Techniques Pub Date : 2024-02-07 DOI: 10.1007/s11416-024-00512-6
Diego Antonelli, Roberta Cascella, Antonio Schiano, G. Perrone, S. Romano
{"title":"“Dirclustering”: a semantic clustering approach to optimize website structure discovery during penetration testing","authors":"Diego Antonelli, Roberta Cascella, Antonio Schiano, G. Perrone, S. Romano","doi":"10.1007/s11416-024-00512-6","DOIUrl":"https://doi.org/10.1007/s11416-024-00512-6","url":null,"abstract":"","PeriodicalId":15545,"journal":{"name":"Journal of Computer Virology and Hacking Techniques","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2024-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139855022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
“Dirclustering”: a semantic clustering approach to optimize website structure discovery during penetration testing "Dirclustering":在渗透测试过程中优化网站结构发现的语义聚类方法
IF 1.5
Journal of Computer Virology and Hacking Techniques Pub Date : 2024-02-07 DOI: 10.1007/s11416-024-00512-6
Diego Antonelli, Roberta Cascella, Antonio Schiano, G. Perrone, S. Romano
{"title":"“Dirclustering”: a semantic clustering approach to optimize website structure discovery during penetration testing","authors":"Diego Antonelli, Roberta Cascella, Antonio Schiano, G. Perrone, S. Romano","doi":"10.1007/s11416-024-00512-6","DOIUrl":"https://doi.org/10.1007/s11416-024-00512-6","url":null,"abstract":"","PeriodicalId":15545,"journal":{"name":"Journal of Computer Virology and Hacking Techniques","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2024-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139795168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Picker Blinder: a framework for automatic injection of malicious inter-app communication Picker Blinder:自动注入恶意应用程序间通信的框架
IF 1.5
Journal of Computer Virology and Hacking Techniques Pub Date : 2024-01-12 DOI: 10.1007/s11416-023-00510-0
Rosangela Casolare, Stefano Fagnano, Giacomo Iadarola, Fabio Martinelli, F. Mercaldo, A. Santone
{"title":"Picker Blinder: a framework for automatic injection of malicious inter-app communication","authors":"Rosangela Casolare, Stefano Fagnano, Giacomo Iadarola, Fabio Martinelli, F. Mercaldo, A. Santone","doi":"10.1007/s11416-023-00510-0","DOIUrl":"https://doi.org/10.1007/s11416-023-00510-0","url":null,"abstract":"","PeriodicalId":15545,"journal":{"name":"Journal of Computer Virology and Hacking Techniques","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2024-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139624101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Faulty use of the CIC-IDS 2017 dataset in information security research 在信息安全研究中错误使用 CIC-IDS 2017 数据集
IF 1.5
Journal of Computer Virology and Hacking Techniques Pub Date : 2023-12-28 DOI: 10.1007/s11416-023-00509-7
Rohit Dube
{"title":"Faulty use of the CIC-IDS 2017 dataset in information security research","authors":"Rohit Dube","doi":"10.1007/s11416-023-00509-7","DOIUrl":"https://doi.org/10.1007/s11416-023-00509-7","url":null,"abstract":"","PeriodicalId":15545,"journal":{"name":"Journal of Computer Virology and Hacking Techniques","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2023-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139149986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Partial key exposure attack on RSA using some private key blocks 利用私钥块对RSA进行部分密钥暴露攻击
Journal of Computer Virology and Hacking Techniques Pub Date : 2023-11-08 DOI: 10.1007/s11416-023-00507-9
Santosh Kumar Ravva, K. L. N. C. Prakash, S. R. M. Krishna
{"title":"Partial key exposure attack on RSA using some private key blocks","authors":"Santosh Kumar Ravva, K. L. N. C. Prakash, S. R. M. Krishna","doi":"10.1007/s11416-023-00507-9","DOIUrl":"https://doi.org/10.1007/s11416-023-00507-9","url":null,"abstract":"RSA is a well-known cryptosystem in public-key cryptography and the strength of the cryptosystem depends on the hardness of factoring large integers. Several attacks have been proposed by using the partial information of the secret parameters, which can be obtained by side-channel attacks. Partial key exposure attacks exploit the information gained by a side-channel attack(s) and identify the potential of the RSA cryptosystem if an attacker knows that partial information. In this paper, we investigate the strength of RSA, if an attacker obtains some blocks of the secret exponent, and by guessing successfully a few most significant bits (MSBs) of any of the primes in RSA. Some blocks of the secret exponent can be extracted by cold boot attack and some MSBs of any of the primes can be guessed correctly. We apply LLL algorithm to attack the RSA and follow the Jochemsz and May approach to construct the lattice.","PeriodicalId":15545,"journal":{"name":"Journal of Computer Virology and Hacking Techniques","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135341674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A natural language processing approach to Malware classification 恶意软件分类的自然语言处理方法
Journal of Computer Virology and Hacking Techniques Pub Date : 2023-10-20 DOI: 10.1007/s11416-023-00506-w
Ritik Mehta, Olha Jurečková, Mark Stamp
{"title":"A natural language processing approach to Malware classification","authors":"Ritik Mehta, Olha Jurečková, Mark Stamp","doi":"10.1007/s11416-023-00506-w","DOIUrl":"https://doi.org/10.1007/s11416-023-00506-w","url":null,"abstract":"Many different machine learning and deep learning techniques have been successfully employed for malware detection and classification. Examples of popular learning techniques in the malware domain include Hidden Markov Models (HMM), Random Forests (RF), Convolutional Neural Networks (CNN), Support Vector Machines (SVM), and Recurrent Neural Networks (RNN) such as Long Short-Term Memory (LSTM) networks. In this research, we consider a hybrid architecture, where HMMs are trained on opcode sequences, and the resulting hidden states of these trained HMMs are used as feature vectors in various classifiers. In this context, extracting the HMM hidden state sequences can be viewed as a form of feature engineering that is somewhat analogous to techniques that are commonly employed in Natural Language Processing (NLP). We find that this NLP-based approach outperforms other popular techniques on a challenging malware dataset, with an HMM-Random Forest model yielding the best results.","PeriodicalId":15545,"journal":{"name":"Journal of Computer Virology and Hacking Techniques","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135567640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信