Visualizing Cyber-Threats in Underground Forums (English)
- New search for: Burroughs, James
- New search for: Tereszkowski-Kaminski, Michal
- New search for: Suarez-Tangil, Guillermo
- New search for: Burroughs, James
- New search for: Tereszkowski-Kaminski, Michal
- New search for: Suarez-Tangil, Guillermo
In:
2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)
;
244-258
;
2023
-
ISBN:
-
ISSN:
- Conference paper / Electronic Resource
-
Title:Visualizing Cyber-Threats in Underground Forums
-
Contributors:Burroughs, James ( author ) / Tereszkowski-Kaminski, Michal ( author ) / Suarez-Tangil, Guillermo ( author )
-
Published in:
-
Publisher:
- New search for: IEEE
-
Publication date:2023-07-01
-
Size:586145 byte
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Conference paper
-
Type of material:Electronic Resource
-
Language:English
-
Source:
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Title Page i| 2023
- 1
-
A Threat Model for Soft Privacy on Smart CarsRaciti, Mario / Bella, Giampaolo et al. | 2023
- 3
-
Title Page iii| 2023
- 4
-
Copyright Page| 2023
- 5
-
Table of Contents| 2023
- 11
-
Vulnerability Analysis of Vehicular Coordinated ManeuversKalogiannis, Konstantinos / Henriksson, Andreas / Papadimitratos, Panos et al. | 2023
- 14
-
Welcome Message from the General Chairs| 2023
- 15
-
Welcome Message from the Workshop Chairs| 2023
- 21
-
A Preliminary Study of Privilege Life Cycle in Software Management Platform Automation WorkflowsBenedetti, Giacomo / Verderame, Luca / Merlo, Alessio et al. | 2023
- 29
-
An Investigation of Quality Issues in Vulnerability Detection DatasetsGuo, Yuejun / Bettaieb, Seifeddine et al. | 2023
- 34
-
GLICE: Combining Graph Neural Networks and Program Slicing to Improve Software Vulnerability DetectionKraker, Wesley de / Vranken, Harald / Hommmersom, Arjen et al. | 2023
- 42
-
Guiding Directed Fuzzing with FeasibilityBai, Weiheng / Wu, Kefu / Wu, Qiushi / Lu, Kangjie et al. | 2023
- 50
-
Effective Machine Learning-based Access Control Administration through UnlearningLlamas, Javier Martinez / Preuveneers, Davy / Joosen, Wouter et al. | 2023
- 58
-
An Analysis System to Test Security of Software on Continuous Integration-Continuous Delivery PipelineAparo, Carmelo / Bernardeschi, Cinzia / Lettieri, Giuseppe / Lucattini, Fabio / Montanarella, Salvatore et al. | 2023
- 68
-
Tales from the Git: Automating the detection of secrets on code and assessing developers’ passwords choicesLykousas, Nikolaos / Patsakis, Constantinos et al. | 2023
- 76
-
A ‘Human-in-the-Loop’ approach for Information Extraction from Privacy Policies under Data ScarcityGebauer, Michael / Maschhur, Faraz / Leschke, Nicola / Grunewald, Elias / Pallas, Frank et al. | 2023
- 84
-
An Analysis of Requirements and Privacy Threats in Mobile Data DonationsReichert, Leonie / Scheuermann, Bjorn et al. | 2023
- 94
-
ATLAS: Automatically Detecting Discrepancies Between Privacy Policies and Privacy LabelsJain, Akshath / Rodriguez, David / Alamo, Jose M. Del / Sadeh, Norman et al. | 2023
- 108
-
Automating privacy decisions -where to draw the line?Morel, Victor / Fischer-Hubner, Simone et al. | 2023
- 117
-
Lessons Learned: Building a Privacy-Preserving Entity Resolution Adaptation of PPJoin using End-to-End Homomorphic EncryptionGhai, Tanmay / Yao, Yixiang / Ravi, Srivatsan et al. | 2023
- 125
-
Privacy as an Architectural Quality: A Definition and an Architectural ViewKunz, Immanuel / Xu, Shuqian et al. | 2023
- 133
-
Secure Key Management for Multi-Party Computation in MOZAIKMarquet, Enzo / Moeyersons, Jerico / Pohle, Erik / Kenhove, Michiel Van / Abidin, Aysajan / Volckaert, Bruno et al. | 2023
- 141
-
Unified Communication: What do Digital Activists need?Reisinger, Thomas / Wagner, Isabel / Boiten, Eerke Albert et al. | 2023
- 150
-
Comparing Privacy Label Disclosures of Apps Published in both the App Store and Google Play StoresRodriguez, David / Jain, Akshath / Alamo, Jose M. Del / Sadeh, Norman et al. | 2023
- 158
-
“Get a higher return on your savings!”: Comparing adverts for cryptocurrency investment scams across platformsSiu, Gilberto Atondo / Hutchings, Alice et al. | 2023
- 170
-
An Argument for Linguistic Expertise in Cyberthreat Analysis: LOLSec in Russian Language eCrime LandscapeManatova, Dalyapraz / Camp, L Jean / Fox, Julia R / Kuebler, Sandra / Shardakova, Maria A / Kouper, Inna et al. | 2023
- 177
-
Applying Neutralisation Theory to Better Understand Ransomware OffendersConnolly, Lena / Borrion, Herve / Arief, Budi / Kaddoura, Sanna et al. | 2023
- 183
-
Digital Drift and the Evolution of a Large Cybercrime ForumHughes, Jack / Hutchings, Alice et al. | 2023
- 194
-
Enhancing Vulnerability Prioritization: Data-Driven Exploit Predictions with Community-Driven InsightsJacobs, Jay / Romanosky, Sasha / Suciu, Octavian / Edwards, Ben / Sarabi, Armin et al. | 2023
- 207
-
How Cryptocurrency Exchange Interruptions Create Arbitrage OpportunitiesMorin, Andrew / Moore, Tyler et al. | 2023
- 216
-
Mapping the Cyberstalking Landscape: An Empirical Analysis of Federal U.S CrimesRomanosky, Sasha / Schirmer, Peter et al. | 2023
- 227
-
On Gaps in Enterprise Cyber Attack ReportingHajizada, Abulfaz / Moore, Tyler et al. | 2023
- 232
-
The Peculiar Case of Tailored Phishing against SMEs: Detection and Collective DefenseMechanisms at a Small IT CompanyBurda, Pavlo / Altawekji, Abdul Malek / Allodi, Luca / Zannone, Nicola et al. | 2023
- 244
-
Visualizing Cyber-Threats in Underground ForumsBurroughs, James / Tereszkowski-Kaminski, Michal / Suarez-Tangil, Guillermo et al. | 2023
- 259
-
A Hybrid Solution for Constrained Devices to Detect Microarchitectural AttacksPolychronou, Nikolaos-Foivos / Thevenon, Pierre-Henri / Puys, Maxime / Beroulle, Vincent et al. | 2023
- 270
-
A Practical Deep Learning-Based Acoustic Side Channel Attack on KeyboardsHarrison, Joshua / Toreini, Ehsan / Mehrnezhad, Maryam et al. | 2023
- 281
-
Combined Internal Attacks on SoC-FPGAs: Breaking AES with Remote Power Analysis and Frequency-based Covert ChannelsFellah-Touta, Anis / Bossuet, Lilian / Lara-Nino, Carlos Andres et al. | 2023
- 287
-
Emulating Side Channel Attacks on gem5: lessons learnedBossuet, Lilian / Grosso, Vincent / Lara-Nino, Carlos Andres et al. | 2023
- 296
-
TimeInspector: A Static Analysis Approach for Detecting Timing AttacksDurmaz, Fatih / Kamadan, Nureddin / Oz, Melih Taha / Unal, Musa / Javeed, Arsalan / Yilmaz, Cemal / Savas, Erkay et al. | 2023
- 304
-
Work in Progress: Thwarting Timing Attacks in Microcontrollers using Fine-grained Hardware ProtectionsGaudin, Nicolas / Hatchikian-Houdot, Jean-Loup / Besson, Frederic / Cotret, Pascal / Gogniat, Guy / Hiet, Guillaume / Lapotre, Vianney / Wilke, Pierre et al. | 2023
- 311
-
Faulting original McEliece’s implementations is possible How to mitigate this risk?Giraud, Vincent / Bouffard, Guillaume et al. | 2023
- 320
-
A Digital Forensic Taxonomy For Programmable Logic Controller Data ArtefactsShahbi, Feras / Gardiner, Joseph / Adepu, Sridhar / Rashid, Awais et al. | 2023
- 329
-
A Key to Embedded System Security: Locking and Unlocking Secrets with a Trusted Platform ModuleLenard, Teri / Collen, Anastasija / Nijdam, Niels A. / Genge, Bela et al. | 2023
- 336
-
From Tactics to Techniques: A Systematic Attack Modeling for Advanced Persistent Threats in Industrial Control SystemsYang, Yunhe / Zhang, Mu et al. | 2023
- 345
-
The Bandit’s States: Modeling State Selection for Stateful Network Fuzzing as Multi-armed Bandit ProblemBorcherding, Anne / Giraud, Mark / Fitzgerald, Ian / Beyerer, Jurgen et al. | 2023
- 351
-
The Case for Virtual PLC-enabled Honeypot DesignChowdhury, Samin Y. / Dudley, Brandon / Sun, Ruimin et al. | 2023
- 358
-
To me, to you: Towards Secure PLC Programming through a Community-Driven Open-Source InitiativeDerbyshire, Richard / Maesschalck, Sam / Staves, Alexander / Green, Benjamin / Hutch, David et al. | 2023
- 363
-
Unsafe Behavior Detection with Adaptive Contrastive Learning in Industrial Control SystemsZheng, Xu / Wang, Tianchun / Chowdhury, Samin Yasar / Sun, Ruimin / Luo, Dongsheng et al. | 2023
- 370
-
ARCSG: Advancing Resilience of Cyber-Physical Smart Grid: An Integrated Co-Simulation Approach Incorporating Indicators of CompromiseAsiri, Mohammed / Saxena, Neetesh / Burnap, Pete et al. | 2023
- 379
-
Re-Envisioning Industrial Control Systems Security by Considering Human Factors as a Core Element of Defense-in-DepthPottebaum, Jens / Rossel, Jost / Somorovsky, Juraj / Acar, Yasemin / Fahr, Rene / Cabarcos, Patricia Arias / Bodden, Eric / Grasler, Iris et al. | 2023
- 386
-
D-GATE: Decentralized Geolocation and Time Enforcement for Usage ControlFelde, Hendrik Meyer Zum / Reding, Jean-Luc / Lux, Michael et al. | 2023
- 396
-
Hexanonymity: a scalable geo-positioned data clustering algorithm for anonymisation purposesRodriguez-Vinas, Javier / Ortega-Fernandez, Ines / Martinez, Eva Sotos et al. | 2023
- 405
-
Masking Location Streams in the Presence of Colluding Service ProvidersDehaene, Toon / Willocx, Michiel / Lagaisse, Bert / Naessens, Vincent et al. | 2023
- 415
-
A Wolf in Sheep’s Clothing: Query-Free Evasion Attacks Against Machine Learning-Based Malware Detectors with Generative Adversarial NetworksGibert, Daniel / Planes, Jordi / Le, Quan / Zizzo, Giulio et al. | 2023
- 427
-
Simplification of General Mixed Boolean-Arithmetic Expressions: GAMBAReichenwallner, Benjamin / Meerwald-Stadler, Peter et al. | 2023
- 439
-
Temporal Analysis of Distribution Shifts in Malware Classification for Digital ForensicsZola, Francesco / Bruse, Jan Lukas / Galar, Mikel et al. | 2023
- 451
-
How well does GPT phish people? An investigation involving cognitive biases and feedbackSharma, Megha / Singh, Kuldeep / Aggarwal, Palvi / Dutt, Varun et al. | 2023
- 458
-
Learning to Defend by Attacking (and Vice-Versa): Transfer of Learning in Cybersecurity GamesMalloy, Tyler / Gonzalez, Cleotilde et al. | 2023
- 465
-
Honey Infiltrator: Injecting Honeytoken Using NetfilterReti, Daniel / Angeli, Tillmann / Schotten, Hans D. et al. | 2023
- 470
-
A First Look at SVCB and HTTPS DNS Resource Records in the WildZirngibl, Johannes / Sattler, Patrick / Carle, Georg et al. | 2023
- 475
-
Assessing and Exploiting Domain Name MisinformationAnderson, Blake / McGrew, David et al. | 2023
- 487
-
Assessing Network Operator Actions to Enhance Digital Sovereignty and Strengthen Network Resilience: A Longitudinal Analysis during the Russia-Ukraine ConflictHaq, Muhammad Yasir Muzayan / Abhishta, Abhishta / Sommese, Raffaele / Jonker, Mattijs / Nieuwenhuis, Lambert J.M. et al. | 2023
- 495
-
Detecting and Analyzing Mouse Tracking in the WildUrpi-Bricolle, Marcel / Castell-Uroz, Ismael / Barlet-Ros, Pere et al. | 2023
- 501
-
Inside Residential IP Proxies: Lessons Learned from Large Measurement CampaignsChiapponi, Elisa / Dacier, Marc / Thonnard, Olivier et al. | 2023
- 513
-
Lost in Translation: AI-based Generator of Cross-Language Sound-squattingValentim, Rodolfo / Drago, Idilio / Mellia, Marco / Cerutti, Federico et al. | 2023
- 521
-
Revisiting OAuth 2.0 Compliance: A Two-Year Follow-Up StudyPhilippaerts, Pieter / Preuveneers, Davy / Joosen, Wouter et al. | 2023
- 526
-
TLS → Post-Quantum TLS: Inspecting the TLS landscape for PQC adoption on AndroidMankowski, Dimitri / Wiggers, Thom / Moonsamy, Veelasha et al. | 2023
- 539
-
Towards more rigorous domain-based metrics: quantifying the prevalence and implications of “Active” DomainsLloyd, Sion / Hernandez-Ganan, Carlos / Tajalizadehkhoob, Samaneh et al. | 2023
- 546
-
Unveiling the Weak Links: Exploring DNS Infrastructure Vulnerabilities and Fortifying DefensesNosyk, Yevheniya / Hureau, Olivier / Fernandez, Simon / Duda, Andrzej / Korczynski, Maciej et al. | 2023
- 558
-
Fake it till you Detect it: Continual Anomaly Detection in Multivariate Time-Series using Generative AIGonzalez, Gaston Garcia / Casas, Pedro / Fernandez, Alicia et al. | 2023
- 567
-
Identifying and Differentiating Acknowledged Scanners in Network TrafficCollins, M. Patrick / Hussain, Alefiya / Schwab, Stephen et al. | 2023
- 575
-
“As Usual, I Needed Assistance of a Seeing Person”: Experiences and Challenges of People with Disabilities and Authentication MethodsErinola, Ahmet / Buckmann, Annalina / Friedauer, Jennifer / Yardim, Asli / Sasse, M. Angela et al. | 2023
- 594
-
Talking Abortion (Mis)information with ChatGPT on TikTokSharevski, Filipo / Loop, Jennifer Vander / Jachim, Peter / Devine, Amy / Pieroni, Emma et al. | 2023
- 609
-
Work in Progress: A Glance at Social Media Self-Censorship in North AmericaHu, Wei / Barradas, Diogo et al. | 2023
- 619
-
Position Paper: The role of law in achieving privacy and security measures in smart buildings from the GDPR contextLeesakul, Natalie / Morisset, Charles et al. | 2023
- 627
-
Divided We Hack: Exploring the Degree of Sino-Russian Coordination in Cyberspace During the Ukraine WarFerazza, Francesco / Melella, Cosimo / Mersinas, Konstantinos / Calcara, Antonio et al. | 2023
- 641
-
U-Sense: Feasibility Study of “Human as a Sensor” in Incident Reporting Systems in a Smart CampusAbah, Naoom Abu / Taylor, Nick / Morisset, Charles / Mehrnezhad, Maryam et al. | 2023
- 653
-
Work in Progress: Evaluation of Security Standards through a Cyber Range using Hackers’ Tactics, Techniques and ProceduresWake, Patrick / Black, Sue / Young, Jonathan et al. | 2023
- 659
-
What We Do in the Shadows: How does Experiencing Cybercrime Affect Response Actions & Protective Practices?Ng, Magdalene / Bada, Maria / Coopamootoo, Kovila P.L. et al. | 2023
- 673
-
Author Index| 2023