Filters








42 Hits in 2.9 sec

Poster

Liao Peng, Cui Xiang, Li Shuhao, Liu Chaoge
<span title="">2011</span> <i title="ACM Press"> Proceedings of the 18th ACM conference on Computer and communications security - CCS &#39;11 </i> &nbsp;
Hybot exploits a hybrid C&C structure, hybrid P2P and URL Flux, to ensure both robustness and effectiveness.  ...  In this paper, we introduce the design of Hybot, a botnet which could recover its command and control (C&C) channel in a tolerable delay in case most of critical resources are destroyed.  ...  Since robustness is relative, recoverability is necessary. HYBRID C&C DESIGN 2.1 Overview Architecture.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2046707.2093505">doi:10.1145/2046707.2093505</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/pdglhn4jmvelrghny3fr2bltfe">fatcat:pdglhn4jmvelrghny3fr2bltfe</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190217225544/https://static.aminer.org/pdf/20170130/pdfs/ccs/hzofzcrm3thaedxb5upg8nl0jabsx6km.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/64/bc/64bc680345a77054d8c7597ea6b469b177bb753a.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2046707.2093505"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

POSTER

Dai Yumei, Liang Yu, Li Ke
<span title="">2014</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/rau5643b7ncwvh74y6p64hntle" style="color: black;">Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security - CCS &#39;14</a> </i> &nbsp;
Consequently, we propose the Hybrid Botnet Ecological Environment (HBEE), which aims to make bots expose as many of their execution paths as possible, in order to mine the C&C protocol vulnerabilities  ...  To be well prepared for future attacks, increasing number of researchers have begun to study advanced botnet designs that could be developed by botmasters in the near future; however, they need a relatively  ...  It also goes a step future to; determine the topological structure of the botnets and discover a suspicious C&C Servers.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2660267.2662369">doi:10.1145/2660267.2662369</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/ccs/YumeiYK14.html">dblp:conf/ccs/YumeiYK14</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/vdid436dcndnxm3cvzeum25lfu">fatcat:vdid436dcndnxm3cvzeum25lfu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190218120411/https://static.aminer.org/pdf/20170130/pdfs/ccs/zbstoqn0gxygi5i94h1ayduoct2hp7bn.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/91/1c/911c40f8ef5c3cf250621e12dc98d1a7da830f58.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2660267.2662369"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

Botnet Triple-Channel Model: Towards Resilient and Efficient Bidirectional Communication Botnets [chapter]

Cui Xiang, Fang Binxing, Shi Jinqiao, Liu Chaoge
<span title="">2013</span> <i title="Springer International Publishing"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/jajl7qtqc5cy7oavratsldrv2y" style="color: black;">Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering</a> </i> &nbsp;
Current research on future botnets mainly focuses on how to design a resilient downlink command and control (C&C) channel.  ...  In fact, most of current botnets (even large-scale and well-known) contain either a resilient (maybe also efficient) unidirectional downlink C&C channel or a vulnerable bidirectional communication channel  ...  [3] presented the design of an advanced hybrid peer-to-peer botnet. Vogt et al.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-04283-1_4">doi:10.1007/978-3-319-04283-1_4</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/laz3mfv3h5dsnaeopcoqqfanwm">fatcat:laz3mfv3h5dsnaeopcoqqfanwm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190222055008/http://pdfs.semanticscholar.org/3a17/aab549c29820dfb038a4e78119eea5120666.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/3a/17/3a17aab549c29820dfb038a4e78119eea5120666.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-04283-1_4"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Moving Target Defense for Cloud Infrastructures: Lessons from Botnets [chapter]

Wei Peng, Feng Li, Xukai Zou
<span title="2013-08-01">2013</span> <i title="Springer New York"> High Performance Cloud Auditing and Applications </i> &nbsp;
This chapter (1) explores the evolution in botnet technologies from the early static architectures to the recent dynamic and resilient architectures that employ various moving target defense (MTD) techniques  ...  to circumvent crackdowns, and (2) draws lessons from botnets in identifying cloud security challenges and proposed solutions to MTD for cloud infrastructures, in which the cloud infrastructure configuration  ...  [66] proposed a recoverable hybrid botnet design.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-1-4614-3296-8_2">doi:10.1007/978-1-4614-3296-8_2</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/fh4ki3lduzf53dm2j5gyv6o7hm">fatcat:fh4ki3lduzf53dm2j5gyv6o7hm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170808230149/http://www.springer.com/cda/content/document/cda_downloaddocument/9781461432951-c1.pdf?SGWID=0-0-45-1445116-p174291477" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/05/cc/05ccddd7085d239f3e8823ac16749769ab0f089c.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-1-4614-3296-8_2"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

OnionBots: Subverting Privacy Infrastructure for Cyber Attacks [article]

Amirali Sanatinia, Guevara Noubir
<span title="2015-01-14">2015</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
Over the last decade botnets survived by adopting a sequence of increasingly sophisticated strategies to evade detection and take overs, and to monetize their infrastructure.  ...  At the same time, the success of privacy infrastructures such as Tor opened the door to illegal activities, including botnets, ransomware, and a marketplace for drugs and contraband.  ...  The transmission of theses commands, which are known as C&C messages, can be centralized, peer-to-peer or hybrid [9] .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1501.03378v1">arXiv:1501.03378v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/mnaicsvxdzbxlkvfcjr53qdf5i">fatcat:mnaicsvxdzbxlkvfcjr53qdf5i</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200928065409/https://arxiv.org/pdf/1501.03378v1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/7d/c0/7dc0a2ca46820c34ec12a67ce5201ca28f6d4de0.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1501.03378v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

CBC2: A Cloud-based Botnet Command and Control

Milad Torkashvan, Hassan Haghighi
<span title="2015-09-22">2015</span> <i title="Indian Society for Education and Environment"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/wffwpj3q45g5zfjzfeyagk5uea" style="color: black;">Indian Journal of Science and Technology</a> </i> &nbsp;
In this paper we propose a mechanism for managing the Botnet C&C communication based on Cloud Computing infrastructures.  ...  To evaluate our work, we have, semi-formally, analyzed four features (Stealthy, Effectiveness, Efficiency, and Robustness) of the mechanism and show that in most of the times the C&C can remain anonymous  ...  One of major issues in Botnet design is to have a robust and easily-recoverable C&C.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.17485/ijst/2015/v8i22/59773">doi:10.17485/ijst/2015/v8i22/59773</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/k5ziipudafex3nxs2vggbyhmk4">fatcat:k5ziipudafex3nxs2vggbyhmk4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180721132311/http://indjst.org/index.php/indjst/article/download/59773/61461" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.17485/ijst/2015/v8i22/59773"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

A Routing Table Poisoning Model for Peer-to-Peer (P2P) Botnets

Sumit Kumar Tetarave, Somanath Tripathy, Ezhil Kalaimannan, Caroline John, Anshika Srivastava
<span title="">2019</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/q7qi7j4ckfac7ehf3mjbso4hne" style="color: black;">IEEE Access</a> </i> &nbsp;
In this paper, we propose a model to analyze the impacts of routing table poisoning attacks on the P2P botnet (rBot) architecture.  ...  Some of these attack models have been proposed in the past using botnets.  ...  Therefore, it is a trade-off among both reproduction rates regarding transmission delay, false positives, and recoverable table entries. C.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/access.2019.2906875">doi:10.1109/access.2019.2906875</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/pomadztg35f5jlnd3zpjicb47q">fatcat:pomadztg35f5jlnd3zpjicb47q</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210429035323/https://ieeexplore.ieee.org/ielx7/6287639/8600701/08692705.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/1b/af/1baf07cbb6b443c03a47ec172161129f27fe2ef0.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/access.2019.2906875"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> ieee.com </button> </a>

Botnet in DDoS Attacks: Trends and Challenges

Nazrul Hoque, Dhruba K. Bhattacharyya, Jugal K. Kalita
<span title="">2015</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/b4kxurpz5vbn7gog6wq32vliii" style="color: black;">IEEE Communications Surveys and Tutorials</a> </i> &nbsp;
A detailed discussion of several botnet architectures, tools developed using botnet architectures, and pros and cons analysis are also included.  ...  Furthermore, a list of important issues and research challenges is also reported. Index Terms-DDoS attack, botnet, mobile botnet, IP traceback, DDoS prevention.  ...  Fig. 11 . 11 Botnet architecture. (a) Centralized architecture. (b) P2P architecture. (c) Hybrid architecture.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/comst.2015.2457491">doi:10.1109/comst.2015.2457491</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/oph4lgawmzbuvgygq4iagsr6eu">fatcat:oph4lgawmzbuvgygq4iagsr6eu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170808014417/http://www.cs.uccs.edu/~jkalita/papers/2015/HoqueNazrulEEETutorials&amp;Surveys2015.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/2a/57/2a57e6a5904998d014c84011630e91d9ed287968.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/comst.2015.2457491"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Secure-MQTT: an efficient fuzzy logic-based approach to detect DoS attack in MQTT protocol for internet of things

Haripriya A. P., Kulothungan K.
<span title="2019-04-05">2019</span> <i title="Springer Nature"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/a5gjzjadkzbirdua4xdqipotp4" style="color: black;">EURASIP Journal on Wireless Communications and Networking</a> </i> &nbsp;
The proposed method uses a fuzzy logic-based system to detect the malicious behavior of the node with the help of a fuzzy rule interpolation mechanism.  ...  Secure-MQTT avoids the use of a dense rule base by exploiting the fuzzy rule interpolation that generates rules dynamically.  ...  A game theory-based hybrid IDS for low constrained devices is proposed in [17] .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1186/s13638-019-1402-8">doi:10.1186/s13638-019-1402-8</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/tcn7budhlvd3vdv4ve5ejiiwii">fatcat:tcn7budhlvd3vdv4ve5ejiiwii</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190427103840/https://jwcn-eurasipjournals.springeropen.com/track/pdf/10.1186/s13638-019-1402-8" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/f9/50/f950adc024627d7fa3b459ab158297fddb7f74a2.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1186/s13638-019-1402-8"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> springer.com </button> </a>

A Survey of IoT and Blockchain Integration: Security Perspective

Elham A. Shammar, Ammar T. Zahary, Asma A. Al-Shargabi
<span title="">2021</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/q7qi7j4ckfac7ehf3mjbso4hne" style="color: black;">IEEE Access</a> </i> &nbsp;
As a result, the future roadmap is hazy, and several challenges and questions must be addressed.  ...  In the Internet of Things (IoT), blockchain can be used to create a decentralized, reliable, and secure environment.  ...  [97] presented a novel hybrid blockchain architecture for IoT, referred to as Hybrid-IoT. In Hybrid-IoT, subgroups of IoT devices, referred to as PoW subblockchains, were created.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/access.2021.3129697">doi:10.1109/access.2021.3129697</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/l3tj4zelejbobouc2ouw3j3pcy">fatcat:l3tj4zelejbobouc2ouw3j3pcy</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20211208004324/https://ieeexplore.ieee.org/ielx7/6287639/9312710/09622256.pdf?tp=&amp;arnumber=9622256&amp;isnumber=9312710&amp;ref=" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/0a/39/0a39fd2a2eeaeb0b64b0e3f5c15c7ded151a1666.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/access.2021.3129697"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> ieee.com </button> </a>

Security of smart manufacturing systems

Nilufer Tuptuk, Stephen Hailes
<span title="">2018</span> <i title="Elsevier BV"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/wi4npej345ektj44cu3fqi2sgi" style="color: black;">Journal of manufacturing systems</a> </i> &nbsp;
A B S T R A C T A revolution in manufacturing systems is underway: substantial recent investment has been directed towards the development of smart manufacturing systems that are able to respond in real  ...  Smart manufacturing is a key component of the broader thrust towards Industry 4.0, and relies on the creation of a bridge between digital and physical environments through Internet of Things (IoT) technologies  ...  While in the system, attacks may send data and receive updates via peer-to-peer communication or a C&C server.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.jmsy.2018.04.007">doi:10.1016/j.jmsy.2018.04.007</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/mbmuoedb35gsbale5qvb6o7lpq">fatcat:mbmuoedb35gsbale5qvb6o7lpq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190429142500/http://discovery.ucl.ac.uk/10051762/1/1-s2.0-S0278612518300463-main.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/19/9d/199ddd509eb7509df91197e72713be3c91737c4e.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.jmsy.2018.04.007"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> elsevier.com </button> </a>

When private set intersection meets big data

Changyu Dong, Liqun Chen, Zikai Wen
<span title="">2013</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/rau5643b7ncwvh74y6p64hntle" style="color: black;">Proceedings of the 2013 ACM SIGSAC conference on Computer &amp; communications security - CCS &#39;13</a> </i> &nbsp;
Given that a modular multiplication is faster than a public key operation but slower than a hash operation, for large input sets (i.e. a large value of n), the PSI scheme in [30] would be slower than our  ...  The protocol also has a higher  ...  Combine the above, in this case we have IDEAL f,Sim S (z) (C, S) cHYBRID OT π,A S (z) (C, S) Client is corrupted We construct a simulator Sim C in the ideal mode.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2508859.2516701">doi:10.1145/2508859.2516701</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/ccs/DongCW13.html">dblp:conf/ccs/DongCW13</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/msc5j6sxd5hchicjqljl34a3ae">fatcat:msc5j6sxd5hchicjqljl34a3ae</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170930134031/https://core.ac.uk/download/pdf/16429676.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/34/76/34763ba49a6cd2b6cbfaebb07b8ae1780a0a75a7.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2508859.2516701"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

PayBreak

Eugene Kolodenker, William Koch, Gianluca Stringhini, Manuel Egele
<span title="">2017</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/rau5643b7ncwvh74y6p64hntle" style="color: black;">Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security - ASIA CCS &#39;17</a> </i> &nbsp;
PayBreak is based on the insight that secure file encryption relies on hybrid encryption where symmetric session keys are used on the victim computer.  ...  PayBreak observes the use of these keys, holds them in escrow, and thus, can decrypt files that would otherwise only be recoverable by paying the ransom.  ...  As previously discussed in §2, ransomware that uses hybrid encryption securely must retrieve the public key pk from the command and control infrastructure (C&C).  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/3052973.3053035">doi:10.1145/3052973.3053035</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/ccs/KolodenkerKSE17.html">dblp:conf/ccs/KolodenkerKSE17</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/3auytq6vhnabthxs2fank4ib3e">fatcat:3auytq6vhnabthxs2fank4ib3e</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190218135405/https://static.aminer.org/pdf/20170130/pdfs/ccs/tuzs1wc6ylogvefi5rebfdixbzwq92rm.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/08/70/0870848b1193987a50ee9c8427c4f597af6fda1b.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/3052973.3053035"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

Practical regular expression matching free of scalability and performance barriers

Kai Wang, Zhe Fu, Xiaohe Hu, Jun Li
<span title="">2014</span> <i title="Elsevier BV"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/mnyvgmlsc5a5xi7554ow77exfu" style="color: black;">Computer Communications</a> </i> &nbsp;
HP Z220 SFF workstation with a 3.40 GHz Intel Core i7-3770.  ...  into a compact and fast matching engine using DFA as its core.  ...  in regex,ˆab only matches the first segment ab of the string abab; [ˆab] matches any ASCII character except a and b / Character set, including the proper subset (with form ½c 1 c 2 Á Á Á c k or [ˆc 1 c  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.comcom.2014.08.005">doi:10.1016/j.comcom.2014.08.005</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/h6ef3gkwefb3rl6oc2b3ifhvci">fatcat:h6ef3gkwefb3rl6oc2b3ifhvci</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170809072224/http://security.riit.tsinghua.edu.cn/share/WangKai-ComCom2014.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/78/e3/78e3b200da934b3da2c6871940f8d7f77a6550f8.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.comcom.2014.08.005"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> elsevier.com </button> </a>

Cloud Based Medical Image Exchange-Security Challenges

S.G. Shini, Tony Thomas, K. Chithraranjan
<span title="">2012</span> <i title="Elsevier BV"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/5i4djr4tgnbobnjegejzpw7nny" style="color: black;">Procedia Engineering</a> </i> &nbsp;
This paper presents a study about the security issues involved in data storage and sharing through cloud.  ...  Ultimately online medical image transfer systems allow physicians to build better and deeper referral networks, which in turn mean increased volumes and a more open platform for collaboration.  ...  Cloud provide services such as Software as a Service (SaaS), Infrastructure as a Service (IaaS) and Platform as a Service (PaaS) [12] .Cloud is available at Private, Public, Community and Hybrid levels  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.proeng.2012.06.399">doi:10.1016/j.proeng.2012.06.399</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/mpo5upu7ivbkzesrez6nde43vu">fatcat:mpo5upu7ivbkzesrez6nde43vu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170928085912/http://publisher-connector.core.ac.uk/resourcesync/data/elsevier/pdf/62c/aHR0cDovL2FwaS5lbHNldmllci5jb20vY29udGVudC9hcnRpY2xlL3BpaS9zMTg3NzcwNTgxMjAyMzEyMA%3D%3D.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/b3/25/b3251caf586963ea3cdae5e8a9b5eb4c55da8464.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.proeng.2012.06.399"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> elsevier.com </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 42 results