Zobrazeno 1 - 8
of 8
pro vyhledávání: '"Keywhan Chung"'
Publikováno v:
Proceedings of the 38th Annual Computer Security Applications Conference.
Autor:
Xiao Li, Thenkurussi Kesavadas, Zeran Zhu, Keywhan Chung, Ravishankar K. Iyer, Peicheng Tang, Zbigniew Kalbarczyk
Publikováno v:
Game Theory and Machine Learning for Cyber Security
Machine learning and artificial intelligence are being adopted to varying applications for automation and flexibility. Cyber security to be no different, researchers and engineers have been investigating the use of data‐driven technologies to harde
Publikováno v:
ICCPS
In this paper, we demonstrate the feasibility of smart malware that advances state-of-the-art attacks by (i) indirectly attacking a computing infrastructure through a cyber-physical system (CPS) that manages the environment in which the computing ent
Publikováno v:
HotSoS
Advanced Persistent Threats (APTs) are among the most sophisticated attacks targeting networked systems. Instead of exploiting a single vulnerability, an APT uses multiple attack vectors to achieve objectives and may remain undetected for an extended
Publikováno v:
HotSoS
When the security of computing infrastructure has been considered, the focus has traditionally been on the infrastructure itself with less thought given to the surrounding systems that affect the operation of the infrastructure. Instead, our indirect
Autor:
Adam Slagell, Zbigniew Kalbarczyk, Valerio Formicola, Ravishankar K. Iyer, Alexander Withers, Keywhan Chung
Publikováno v:
CNS
In this paper, we show that a malicious user can attack a large computing infrastructure by compromising the environmental control systems in the facilities that host the compute nodes. Such violations cannot be easily recognized by the administrator
Publikováno v:
HASE
Recent attacks show that threats to cyber infrastructureare not only increasing in volume, but are getting moresophisticated. The attacks may comprise multiple actions that arehard to differentiate from benign activity, and therefore commondetection
Publikováno v:
HotSoS
This paper presents a system named SPOT to achieve high accuracy and preemptive detection of attacks. We use security logs of real-incidents that occurred over a six-year period at National Center for Supercomputing Applications (NCSA) to evaluate SP