Zobrazeno 1 - 10
of 226
pro vyhledávání: '"Wenke Lee"'
Publikováno v:
Proceedings of the 38th Annual Computer Security Applications Conference.
Publikováno v:
Proceedings of the 38th Annual Computer Security Applications Conference.
Publikováno v:
IEEE Security & Privacy. 19:58-65
This article studies the feasibility of using a botnet to automate stock market manipulation, incorporating data from U.S. Securities and Exchange Commission case files, security surveys of online retail brokerage accounts, and dark web marketplace l
Publikováno v:
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security.
Autor:
Yisroel Mirsky, Wenke Lee
Publikováno v:
ACM Computing Surveys. 54:1-41
Generative deep learning algorithms have progressed to a point where it is difficult to tell the difference between what is real and what is fake. In 2018, it was discovered how easy it is to use this technology for unethical and malicious applicatio
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. 18:160-173
With the wide deployment of security mechanisms such as Address Space Layout Randomization (ASLR), memory disclosures have become a prerequisite for critical memory-corruption attacks (e.g., code-reuse attack)—adversaries are forced to exploit memo
Autor:
Radha Poovendran, Wenke Lee, Dinuka Sahabandu, Shana Moothedath, Linda Bushnell, Joey Allen, Andrew Clark
Publikováno v:
IEEE Transactions on Automatic Control. 65:5248-5263
Advanced persistent threats (APTs) infiltrate cyber systems and compromise specifically targeted data and/or resources through a sequence of stealthy attacks consisting of multiple stages. Dynamic information flow tracking has been proposed to detect
Autor:
Yisroel Mirsky, Ambra Demontis, Jaidip Kotak, Ram Shankar, Deng Gelei, Liu Yang, Xiangyu Zhang, Maura Pintor, Wenke Lee, Yuval Elovici, Battista Biggio
Publikováno v:
Computers & Security. 124:103006
Autor:
Wajih Ul Hassan, Carter Yagemann, Wenke Lee, Adam Bates, Mohammad A. Noureddine, Simon P. Chung
Publikováno v:
CCS
Provenance-based causal analysis of audit logs has proven to be an invaluable method of investigating system intrusions. However, it also suffers from dependency explosion, whereby long-running processes accumulate many dependencies that are hard to
Publikováno v:
CCS
The increasing cost of successful cyberattacks has caused a mindset shift, whereby defenders now employ proactive defenses, namely software bug hunting, alongside existing reactive measures (firewalls, IDS, IPS) to protect systems. Unfortunately the