


default search action
Digital Threats: Research and Practice, Volume 4
Volume 4, Number 1, March 2023
- Henry Howland:
CVSS: Ubiquitous and Broken. 1:1-1:12 - Ricardo Alejandro Manzano Sanchez, Kshirasagar Naik, Abdurhman Albasir, Marzia Zaman, Nishith Goel:
Detection of Anomalous Behavior of Smartphone Devices using Changepoint Analysis and Machine Learning Techniques. 2:1-2:28 - Behnam Shobiri
, Mohammad Mannan, Amr M. Youssef
:
CDNs' Dark Side: Security Problems in CDN-to-Origin Connections. 3:1-3:22 - Ya Xiao, Yang Zhao, Nicholas Allen, Nathan Keynes, Danfeng (Daphne) Yao
, Cristina Cifuentes:
Industrial Experience of Finding Cryptographic Vulnerabilities in Large-scale Codebases. 4:1-4:18 - Stefano Carnà, Serena Ferracci, Francesco Quaglia, Alessandro Pellegrini
:
Fight Hardware with Hardware: Systemwide Detection and Mitigation of Side-channel Attacks Using Performance Counters. 5:1-5:24 - Maksim Ekin Eren, Juston S. Moore, Erik Skau, Elisabeth Moore, Manish Bhattarai
, Gopinath Chennupati
, Boian S. Alexandrov:
General-purpose Unsupervised Cyber Anomaly Detection via Non-negative Tensor Factorization. 6:1-6:28 - Dimitrios Georgoulias
, Jens Myrup Pedersen
, Morten Falch
, Emmanouil Vasilomanolakis
:
COVID-19 Vaccination Certificates in the Darkweb. 7:1-7:17 - Giovanni Apruzzese
, Pavel Laskov, Edgardo Montes de Oca
, Wissam Mallouli
, Luis Burdalo Rapa, Athanasios Vasileios Grammatopoulos
, Fabio Di Franco:
The Role of Machine Learning in Cybersecurity. 8:1-8:38 - Mengfei Ren
, Xiaolei Ren
, Huadong Feng, Jiang Ming, Yu Lei:
Security Analysis of Zigbee Protocol Implementation via Device-agnostic Fuzzing. 9:1-9:24 - Luis Puche Rondon
, Leonardo Babun, Ahmet Aris
, Kemal Akkaya, A. Selcuk Uluagac
:
LGuard: Securing Enterprise-IoT Systems against Serial-Based Attacks via Proprietary Communication Buses. 10:1-10:26 - Moustafa Mahmoud, Mohammad Mannan, Amr M. Youssef
:
APTHunter: Detecting Advanced Persistent Threats in Early Stages. 11:1-11:31 - Max Landauer
, Markus Wurzenberger
, Florian Skopik
, Wolfgang Hotwagner
, Georg Höld
:
AMiner: A Modular Log Data Analysis Pipeline for Anomaly-based Intrusion Detection. 12:1-12:16 - Saurabh Kumar
, Debadatta Mishra, Biswabandan Panda, Sandeep Kumar Shukla
:
InviSeal: A Stealthy Dynamic Analysis Framework for Android Systems. 13:1-13:31 - Alexander Staves, Antonios Gouglidis, David Hutchison:
An Analysis of Adversary-Centric Security Testing within Information and Operational Technology Environments. 14:1-14:29
- Alan Levine, Brett Alan Tucker:
Zero Trust Architecture: Risk Discussion. 15:1-15:6
Volume 4, Number 2, June 2023
- Aydin Aysu
, Scott R. Graham
:
Introduction to the Special Issue on the Digital Threats of Hardware Security. 16:1-16:2 - Tor J. Langehaug
, Brett J. Borghetti, Scott R. Graham
:
Classifying Co-resident Computer Programs Using Information Revealed by Resource Contention. 17:1-17:29 - Lionel Morel, Damien Couroussé
, Thomas Hiscock:
Code Polymorphism Meets Code Encryption: Confidentiality and Side-channel Protection of Software Components. 18:1-18:27 - Karim Lounis, Mohammad Zulkernine:
Lessons Learned: Analysis of PUF-based Authentication Protocols for IoT. 19:1-19:33 - Girish Vaidya, T. V. Prabhakar, Nithish K. Gnani
, Ryan Shah
, Shishir Nagaraja:
Sensor Identification via Acoustic Physically Unclonable Function. 20:1-20:25 - Huili Chen, Cheng Fu, Jishen Zhao, Farinaz Koushanfar:
GALU: A Genetic Algorithm Framework for Logic Unlocking. 21:1-21:30 - Abdurhman Albasir, Kshirasagar Naik, Ricardo Manzano
:
Toward Improving the Security of IoT and CPS Devices: An AI Approach. 22:1-22:30
- S. S. Iyengar
, Bhavani Thuraisingham, Marek Zmuda:
Special Issue on Actionable Information for Digital Threat Discovery Using Contextualized Data or Multi Sensor Data Fusion. 23:1-23:2 - Jonathan Oakley, Carl R. Worley, Lu Yu, Richard R. Brooks, Ilker Özçelik, Anthony Skjellum, Jihad S. Obeid
:
Scrybe: A Secure Audit Trail for Clinical Trial Data Fusion. 24:1-24:20 - Poushali Sengupta, Sudipta Paul, Subhankar Mishra:
BUDS+: Better Privacy with Converger and Noisy Shuffling. 25:1-25:23
- Fran Casino, Nikolaos Totosis, Theodoros Apostolopoulos, Nikolaos Lykousas, Constantinos Patsakis
:
Analysis and Correlation of Visual Evidence in Campaigns of Malicious Office Documents. 26:1-26:19 - Robert A. Bridges, Sean Oesch
, Michael D. Iannacone, Kelly M. T. Huffer, Brian Jewell, Jeffrey A. Nichols, Brian Weber, Miki E. Verma, Daniel Scofield, Craig Miles
, Thomas Plummer, Mark Daniell, Anne M. Tall, Justin M. Beaver, Jared M. Smith:
Beyond the Hype: An Evaluation of Commercially Available Machine Learning-based Malware Detectors. 27:1-27:22 - Rajat Subhra Bhowmick, Rahul Indra, Isha Ganguli
, Jayanta Paul
, Jaya Sil
:
Breaking Captcha System with Minimal Exertion through Deep Learning: Real-time Risk Assessment on Indian Government Websites. 28:1-28:24 - Thomas Walshe
, Andrew Simpson
:
Towards a Greater Understanding of Coordinated Vulnerability Disclosure Policy Documents. 29:1-29:36 - Pierre Graux
, Jean-François Lalande
, Valérie Viet Triem Tong
, Pierre Wilke:
OATs'inside: Retrieving Object Behaviors From Native-based Obfuscated Android Applications. 30:1-30:27
Volume 4, Number 3, September 2023
- Andreas Dewald, Thomas Schreck
:
Introduction to the IMF 2023 Special Issue. 31:1-31:2 - Andreas Hammer, Mathis Ohlig, Julian Geus, Felix C. Freiling
:
A Functional Classification of Forensic Access to Storage and its Legal Implications. 32:1-32:14 - Jan Gruber
, Merlin Humml
:
A Formal Treatment of Expressiveness and Relevanceof Digital Evidence. 33:1-33:16 - Samantha Klier
, Jan Varenkamp, Harald Baier:
Back and Forth - On Automatic Exposure of Origin and Dissemination of Files on Windows. 34:1-34:17 - Edita Bajramovic, Christofer Fein, Marius Frinken, Paul Rösler, Felix C. Freiling
:
LAVA: Log Authentication and Verification Algorithm. 35:1-35:17 - Tobias Hilbig
, Thomas Geras
, Erwin Kupris, Thomas Schreck
:
security.txt Revisited: Analysis of Prevalence and Conformity in 2022. 36:1-36:17 - Florian Bausch, Andreas Dewald:
Forensic Examination of Ceph. 37:1-37:18 - Thomas Göbel
, Harald Baier, Frank Breitinger
:
Data for Digital Forensics: Why a Discussion on "How Realistic is Synthetic Data" is Dispensable. 38:1-38:18
- Marcus Botacin, Uriel Kosayev, Ruimin Sun:
Introduction to the Special Issue on Memory-Based Malware and Other Unconventional Threats. 39:1 - Anthony Rose
, Scott R. Graham
, Jacob J. Krasnov
:
IronNetInjector: Weaponizing .NET Dynamic Language Runtime Engines. 40:1-40:23 - Oleg Boyarchuk, Sebastiano Mariani, Stefano Ortolani, Giovanni Vigna
:
Keeping Up with the Emotets: Tracking a Multi-infrastructure Botnet. 41:1-41:29
- Shreyas Srinivasa
, Jens Myrup Pedersen
, Emmanouil Vasilomanolakis
:
Gotta Catch 'em All: A Multistage Framework for Honeypot Fingerprinting. 42:1-42:28 - P. Mohan Anand
, P. V. Sai Charan, Sandeep K. Shukla
:
HiPeR - Early Detection of a Ransomware Attack using Hardware Performance Counters. 43:1-43:24 - Mattia Falduti, Sergio Tessaris:
Mapping the Interdisciplinary Research on Non-consensual Pornography: Technical and Quantitative Perspectives. 44:1-44:22 - Sharifah Roziah Binti Mohd Kassim, Shujun Li
, Budi Arief:
Understanding How National CSIRTs Evaluate Cyber Incident Response Tools and Data: Findings from Focus Group Discussions. 45:1-45:24 - Kibreab Adane, Berhanu Beyene, Mohammed Abebe Yimer
:
Single and Hybrid-Ensemble Learning-Based Phishing Website Detection: Examining Impacts of Varied Nature Datasets and Informative Feature Selection Technique. 46:1-46:27
Volume 4, Number 4, December 2023
- Angel Hueca, Sharon Mudd, Timothy J. Shimeall:
Introduction to the Special Issue on Information Sharing. 47:1-47:2 - Martin Husák, Pavol Sokol
, Martin Zádník
, Václav Bartos
, Martin Horák:
Lessons Learned from Automated Sharing of Intrusion Detection Alerts: The Case of the SABU Platform. 48:1-48:11 - Kate Connolly, Anna Klempay
, Mary McCann, Paul R. Brenner
:
Dark Web Marketplaces: Data for Collaborative Threat Intelligence. 49:1-49:12 - Antonios Xenakis, Sabrina Mamtaz Nourin, Zhiyuan Chen, George Karabatis, Ahmed Aleroud
, Jhancy Amarsingh:
A Self-adaptive and Secure Approach to Share Network Trace Data. 50:1-50:20
- Budi Arief, Lena Yuryna Connolly, Julio C. Hernandez-Castro, Allan Liska, Peter Y. A. Ryan
:
Introduction to the Special Issue on Ransomware. 51:1-51:3 - Michael Lang
, Lena Yuryna Connolly, Paul Taylor
, Phillip J. Corner:
The Evolving Menace of Ransomware: A Comparative Analysis of Pre-pandemic and Mid-pandemic Attacks. 52:1-52:22 - Yagiz Yilmaz, Orçun Çetin, Claudia Grigore, Budi Arief, Julio C. Hernandez-Castro:
Personality Types and Ransomware Victimisation. 53:1-53:25 - Michael Mundt
, Harald Baier:
Threat-Based Simulation of Data Exfiltration Toward Mitigating Multiple Ransomware Extortions. 54:1-54:23 - Louise Axon
, Arnau Erola
, Ioannis Agrafiotis, Ganbayar Uuganbayar, Michael Goldsmith
, Sadie Creese
:
Ransomware as a Predator: Modelling the Systemic Risk to Prey. 55:1-55:38 - Anna Cartwright
, Edward J. Cartwright
:
The Economics of Ransomware Attacks on Integrated Supply Chain Networks. 56:1-56:14 - Pranshu Bajpai
, Richard J. Enbody
:
Know Thy Ransomware Response: A Detailed Framework for Devising Effective Ransomware Response Strategies. 57:1-57:19
- Koen van Hove, Jeroen van der Ham-de Vos
, Roland van Rijswijk-Deij
:
rpkiller: Threat Analysis of the BGP Resource Public Key Infrastructure. 58:1-58:24 - David Allison
, Kieran McLaughlin, Paul Smith:
Goosewolf: An Embedded Intrusion Detection System for Advanced Programmable Logic Controllers. 59:1-59:19

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.