Skip to content

elladcook/Security

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

11 Commits
 
 

Repository files navigation

Security

Ransomware Detection

  1. RøB: Ransomware over Modern Web Browsers [USENIX Security'23]
  2. Poster: Data Recovery from Ransomware Attacks via File System Forensics and Flash Translation Layer Data Extraction [CCS'22]
  3. Poster: MUSTARD - Adaptive Behavioral Analysis for Ransomware Detection [CCS'22]
  4. Wake Up Digital Forensics’ Community and Help Combat Ransomware [IEEE Symposium on Security and Privacy'22]
  5. TEE-aided Write Protection Against Privileged Data Tampering [NDSS'19]
  6. The aftermath of a crypto-ransomware attack at a large academic institution [USENIX Security'18]
  7. Protecting against Ransomware: A New Line of Research or Restating Classic Ideas? [IEEE Symposium on Security and Privacy'18]
  8. A Storage-level Detection Mechanism against Crypto-Ransomware [CCS'18]
  9. Tracking Ransomware End-to-end [IEEE Symposium on Security and Privacy'18]
  10. UNVEIL: A Large-Scale, Automated Approach to Detecting Ransomware [USENIX Security'16]

Malware Detection

  1. Humans vs. Machines in Malware Classification [USENIX Security '23]
  2. FCGAT: Interpretable Malware Classification Method using Function Call Graph and Attention Mechanism [NDSS'23]
  3. Exposing the Rat in the Tunnel: Using Traffic Analysis for Tor-based Malware Detection [CCS'22]
  4. Forecasting Malware Capabilities From Cyber Attack Memory Images [USENIX Security'21]
  5. When Malware Changed Its Mind: An Empirical Study of Variable Program Behaviors in the Real World [USENIX Security'21]
  6. Differential Training: A Generic Framework to Reduce Label Noises for Android Malware Detection [NDSS'21]
  7. DeepReflect: Discovering Malicious Functionality through Binary Reconstruction [USENIX Security'21]
  8. You Are What You Do: Hunting Stealthy Malware via Data Provenance Analysis [NDSS'20]
  9. Prevalence and Impact of Low-Entropy Packing Schemes in the Malware Ecosystem [NDSS'20]
  10. When Malware is Packin' Heat; Limits of Machine Learning Classifiers Based on Static Analysis Features [NDSS'20]
  11. ExSpectre: Hiding Malware in Speculative Execution [NDSS'19]

eBPF

  1. Cross Container Attacks: The Bewildered eBPF on Clouds [USENIX Security'23]
  2. Electrode: Accelerating Distributed Protocols with eBPF [NSDI'23]
  3. Comparing Security in eBPF and WebAssembly [eBPF'23]
  4. Seeing the Invisible: Auditing eBPF Programs in Hypervisor with HyperBee [eBPF'23]
  5. Enabling BPF Runtime policies for better BPF management [eBPF'23]
  6. Network Profiles for Detecting Application-Characteristic Behavior Using Linux eBPF [eBPF'23]
  7. RingGuard: Guard io_uring with eBPF [eBPF'23]
  8. Unleashing Unprivileged eBPF Potential with Dynamic Sandboxing [eBPF'23]
  9. Practical and Flexible Kernel CFI Enforcement using eBPF [eBPF'23]
  10. XRP: In-Kernel Storage Functions with eBPF [OSDI'22]
  11. PeriScope: An Effective Probing and Fuzzing Framework for the Hardware-OS Boundary [NDSS'19]

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published