International Conference on Detection of intrusions and malware, and vulnerability assessment最新文献

筛选
英文 中文
Madvex: Instrumentation-based Adversarial Attacks on Machine Learning Malware Detection Madvex:机器学习恶意软件检测中基于仪器的对抗性攻击
Nils Loose, Felix Mächtle, Claudius Pott, V. Bezsmertnyĭ, T. Eisenbarth
{"title":"Madvex: Instrumentation-based Adversarial Attacks on Machine Learning Malware Detection","authors":"Nils Loose, Felix Mächtle, Claudius Pott, V. Bezsmertnyĭ, T. Eisenbarth","doi":"10.48550/arXiv.2305.02559","DOIUrl":"https://doi.org/10.48550/arXiv.2305.02559","url":null,"abstract":"WebAssembly (Wasm) is a low-level binary format for web applications, which has found widespread adoption due to its improved performance and compatibility with existing software. However, the popularity of Wasm has also led to its exploitation for malicious purposes, such as cryptojacking, where malicious actors use a victim's computing resources to mine cryptocurrencies without their consent. To counteract this threat, machine learning-based detection methods aiming to identify cryptojacking activities within Wasm code have emerged. It is well-known that neural networks are susceptible to adversarial attacks, where inputs to a classifier are perturbed with minimal changes that result in a crass misclassification. While applying changes in image classification is easy, manipulating binaries in an automated fashion to evade malware classification without changing functionality is non-trivial. In this work, we propose a new approach to include adversarial examples in the code section of binaries via instrumentation. The introduced gadgets allow for the inclusion of arbitrary bytes, enabling efficient adversarial attacks that reliably bypass state-of-the-art machine learning classifiers such as the CNN-based Minos recently proposed at NDSS 2021. We analyze the cost and reliability of instrumentation-based adversarial example generation and show that the approach works reliably at minimal size and performance overheads.","PeriodicalId":268358,"journal":{"name":"International Conference on Detection of intrusions and malware, and vulnerability assessment","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127569952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
How Does Malware Use RDTSC? A Study on Operations Executed by Malware with CPU Cycle Measurement 恶意软件如何使用RDTSC?基于CPU周期测量的恶意软件执行操作研究
Y. Oyama
{"title":"How Does Malware Use RDTSC? A Study on Operations Executed by Malware with CPU Cycle Measurement","authors":"Y. Oyama","doi":"10.1007/978-3-030-22038-9_10","DOIUrl":"https://doi.org/10.1007/978-3-030-22038-9_10","url":null,"abstract":"","PeriodicalId":268358,"journal":{"name":"International Conference on Detection of intrusions and malware, and vulnerability assessment","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127751457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Practical Password Hardening Based on TLS 基于TLS的实用密码加固
Constantinos Diomedous, E. Athanasopoulos
{"title":"Practical Password Hardening Based on TLS","authors":"Constantinos Diomedous, E. Athanasopoulos","doi":"10.1007/978-3-030-22038-9_21","DOIUrl":"https://doi.org/10.1007/978-3-030-22038-9_21","url":null,"abstract":"","PeriodicalId":268358,"journal":{"name":"International Conference on Detection of intrusions and malware, and vulnerability assessment","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134236820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Wild Extensions: Discovering and Analyzing Unlisted Chrome Extensions 野生扩展:发现和分析未上市的Chrome扩展
Aidan Beggs, A. Kapravelos
{"title":"Wild Extensions: Discovering and Analyzing Unlisted Chrome Extensions","authors":"Aidan Beggs, A. Kapravelos","doi":"10.1007/978-3-030-22038-9_1","DOIUrl":"https://doi.org/10.1007/978-3-030-22038-9_1","url":null,"abstract":"","PeriodicalId":268358,"journal":{"name":"International Conference on Detection of intrusions and malware, and vulnerability assessment","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129440232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
TypeMiner: Recovering Types in Binary Programs Using Machine Learning TypeMiner:使用机器学习恢复二进制程序中的类型
Alwin Maier, Hugo Gascon, Christian Wressnegger, Konrad Rieck
{"title":"TypeMiner: Recovering Types in Binary Programs Using Machine Learning","authors":"Alwin Maier, Hugo Gascon, Christian Wressnegger, Konrad Rieck","doi":"10.1007/978-3-030-22038-9_14","DOIUrl":"https://doi.org/10.1007/978-3-030-22038-9_14","url":null,"abstract":"","PeriodicalId":268358,"journal":{"name":"International Conference on Detection of intrusions and malware, and vulnerability assessment","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125688460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
On the Perils of Leaking Referrers in Online Collaboration Services 在线协作服务中referer泄露的危险
Beliz Kaleli, Manuel Egele, G. Stringhini
{"title":"On the Perils of Leaking Referrers in Online Collaboration Services","authors":"Beliz Kaleli, Manuel Egele, G. Stringhini","doi":"10.1007/978-3-030-22038-9_4","DOIUrl":"https://doi.org/10.1007/978-3-030-22038-9_4","url":null,"abstract":"","PeriodicalId":268358,"journal":{"name":"International Conference on Detection of intrusions and malware, and vulnerability assessment","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132725499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Large-Scale Analysis of Infrastructure-Leaking DNS Servers 大规模基础设施DNS服务器泄漏分析
Dennis Tatang, C. Schneider, Thorsten Holz
{"title":"Large-Scale Analysis of Infrastructure-Leaking DNS Servers","authors":"Dennis Tatang, C. Schneider, Thorsten Holz","doi":"10.1007/978-3-030-22038-9_17","DOIUrl":"https://doi.org/10.1007/978-3-030-22038-9_17","url":null,"abstract":"","PeriodicalId":268358,"journal":{"name":"International Conference on Detection of intrusions and malware, and vulnerability assessment","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123024313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Overshadow PLC to Detect Remote Control-Logic Injection Attacks 遮蔽PLC以检测远程控制逻辑注入攻击
Hyunguk Yoo, Sushma Kalle, Jared M. Smith, Irfan Ahmed
{"title":"Overshadow PLC to Detect Remote Control-Logic Injection Attacks","authors":"Hyunguk Yoo, Sushma Kalle, Jared M. Smith, Irfan Ahmed","doi":"10.1007/978-3-030-22038-9_6","DOIUrl":"https://doi.org/10.1007/978-3-030-22038-9_6","url":null,"abstract":"","PeriodicalId":268358,"journal":{"name":"International Conference on Detection of intrusions and malware, and vulnerability assessment","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133752704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Morellian Analysis for Browsers: Making Web Authentication Stronger with Canvas Fingerprinting Morellian分析浏览器:使Web认证与画布指纹更强
Pierre Laperdrix, Gildas Avoine, B. Baudry, Nick Nikiforakis
{"title":"Morellian Analysis for Browsers: Making Web Authentication Stronger with Canvas Fingerprinting","authors":"Pierre Laperdrix, Gildas Avoine, B. Baudry, Nick Nikiforakis","doi":"10.1007/978-3-030-22038-9_3","DOIUrl":"https://doi.org/10.1007/978-3-030-22038-9_3","url":null,"abstract":"","PeriodicalId":268358,"journal":{"name":"International Conference on Detection of intrusions and malware, and vulnerability assessment","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130501577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Detecting, Fingerprinting and Tracking Reconnaissance Campaigns Targeting Industrial Control Systems 针对工业控制系统的探测、指纹识别和跟踪侦察活动
Olivier Cabana, A. Youssef, M. Debbabi, Bernard Lebel, Marthe Kassouf, B. Agba
{"title":"Detecting, Fingerprinting and Tracking Reconnaissance Campaigns Targeting Industrial Control Systems","authors":"Olivier Cabana, A. Youssef, M. Debbabi, Bernard Lebel, Marthe Kassouf, B. Agba","doi":"10.1007/978-3-030-22038-9_5","DOIUrl":"https://doi.org/10.1007/978-3-030-22038-9_5","url":null,"abstract":"","PeriodicalId":268358,"journal":{"name":"International Conference on Detection of intrusions and malware, and vulnerability assessment","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125788972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信