Zobrazeno 1 - 10
of 163
pro vyhledávání: '"Savage, Stefan"'
The success of generative AI relies heavily on training on data scraped through extensive crawling of the Internet, a practice that has raised significant copyright, privacy, and ethical concerns. While few measures are designed to resist a resource-
Externí odkaz:
http://arxiv.org/abs/2411.15091
Autor:
Liu, Enze, Luo, Elisa, Yan, Jian Chen, Izhikevich, Katherine, Grant, Stewart, Stefan, Deian, Voelker, Geoffrey M, Savage, Stefan
Between 2021 and 2023, crypto assets valued at over \$US2.6 billion were stolen via attacks on "bridges" -- decentralized services designed to allow inter-blockchain exchange. While the individual exploits in each attack vary, a single design flaw un
Externí odkaz:
http://arxiv.org/abs/2410.01107
Autor:
Liu, Enze, Kappos, George, Mugnier, Eric, Invernizzi, Luca, Savage, Stefan, Tao, David, Thomas, Kurt, Voelker, Geoffrey M., Meiklejohn, Sarah
Scams -- fraudulent schemes designed to swindle money from victims -- have existed for as long as recorded history. However, the Internet's combination of low communication cost, global reach, and functional anonymity has allowed scam volumes to reac
Externí odkaz:
http://arxiv.org/abs/2405.09757
National Security Letters (NSLs) are similar to administrative subpoenas and can be issued directly by elements of the executive branch without requiring prior approval from a court or grand jury. Importantly, NSLs authorize the imposition of nondisc
Externí odkaz:
http://arxiv.org/abs/2403.02768
In this work, we analyze to what extent actors target poorly-secured cloud storage buckets for attack. We deployed hundreds of AWS S3 honeybuckets with different names and content to lure and measure different scanning strategies. Actors exhibited cl
Externí odkaz:
http://arxiv.org/abs/2312.00580
Autor:
Liu, Enze, Akiwate, Gautam, Jonker, Mattijs, Mirian, Ariana, Ho, Grant, Voelker, Geoffrey M., Savage, Stefan
Publikováno v:
The 8th IEEE European Symposium on Security and Privacy, 2023
The critical role played by email has led to a range of extension protocols (e.g., SPF, DKIM, DMARC) designed to protect against the spoofing of email sender domains. These protocols are complex as is, but are further complicated by automated email f
Externí odkaz:
http://arxiv.org/abs/2302.07287
Autor:
Randall, Audrey, Snyder, Peter, Ukani, Alisha, Snoeren, Alex, Voelker, Geoff, Savage, Stefan, Schulman, Aaron
This work presents a systematic study of navigational tracking, the latest development in the cat-and-mouse game between browsers and online trackers. Navigational tracking allows trackers to 'aggregate users' activities and behaviors across sites by
Externí odkaz:
http://arxiv.org/abs/2203.10188
Autor:
Ho, Grant, Dhiman, Mayank, Akhawe, Devdatta, Paxson, Vern, Savage, Stefan, Voelker, Geoffrey M., Wagner, David
In successful enterprise attacks, adversaries often need to gain access to additional machines beyond their initial point of compromise, a set of internal movements known as lateral movement. We present Hopper, a system for detecting lateral movement
Externí odkaz:
http://arxiv.org/abs/2105.13442
Autor:
Ho, Grant, Cidon, Asaf, Gavish, Lior, Schweighauser, Marco, Paxson, Vern, Savage, Stefan, Voelker, Geoffrey M., Wagner, David
We present the first large-scale characterization of lateral phishing attacks, based on a dataset of 113 million employee-sent emails from 92 enterprise organizations. In a lateral phishing attack, adversaries leverage a compromised enterprise accoun
Externí odkaz:
http://arxiv.org/abs/1910.00790
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.