The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Enterprises today are facing an increasing number of criminal threats ranging from financially motivated and opportunistic malware to more advanced targeted attacks organized by nation-state actors. To protect against these threats, enterprises deploy a number of perimeter defenses, including traditional controls (antivirus software, intrusion detection systems, firewalls) and more advanced techniques...
Security exploits and ensuant malware pose an increasing challenge to computing systems as the variety and complexity of attacks continue to increase. In response, software-based malware detection tools have grown in complexity, thus making it computationally difficult to use them to protect systems in real-time. Therefore, software detectors are applied selectively and at a low frequency, creating...
Android platform has become a primary target for malware. In this paper we present SafeDroid, an open source distributed service to detect malicious apps on Android by combining static analysis and machine learning techniques. It is composed by three micro-services, working together, combining static analysis and machine learning techniques. SafeDroid has been designed as a user friendly service,...
Mobile devices have become our true companions in recent years. While bringing plenty of convenience, they also come with many security and privacy concerns. Being small, a mobile device is prone to loss or theft. Privacy data such as emails in a saved Gmail or Yahoo account on a lost device can be easily accessed by an unwanted visitor. Therefore, it is essential to research methods protecting mobile...
With the rapid development of the apps on mobile phones, it brings some hidden troubles to us. The app lack of security protection mechanism might be tampered and repackaged into a new app, and this new app can be released into application markets. Based on the call hierarchy of the classes in an android package, we develop a similarity evaluation method of apps. This method sets a similarity threshold,...
In recent years, social networks have experienced strong growth in both size and popularity. One of the main characteristics of these systems is their reliance on users as the primary contributors of content. This dependence makes the users of these systems the best targets for malicious behavior. In an effort to preserve community value and ensure long term success, the proposed approach is based...
The main concern associated with biometric structures which are stored in a database is the security of the template storage system. A new technique which assembles the encryption key and biometric sample using a cryptographic means is the fuzzy vault. The fuzzy vault scheme provides supreme security to the templates which are stored in a database or smart card. Compared to an ordinary system which...
A Biometric Framework is one of the crucial Pattern Recognition Framework that are utilized for recognizing individuals utilizing distinctive Biometric Characteristics. The Authentication System design using single modality may not fulfill the prerequisite of requesting applications in term of properties, for example, Accuracy, Acceptability and Performances. Due to its limitations, Multimodal Biometrics...
The exponential growth of unstructured messages generated by the computer systems and applications in modern computing environment poses a significant challenge in managing and using the information contained in the messages. Although these data contain a wealth of information that is useful for advanced threat detection, the sheer volume, variety, and complexity of data make it difficult to analyze...
With the security situation in Cyberspace constantly becoming worse, Cyber threat detection has attracted a lot of researching attentions. In this paper, existing detection technologies are firstly reviewed. Secondly, a framework of capturing the abnormal traffic of botnets is proposed. Major modules and key detection techniques are presented at the same time. The hidden threat detection in physically...
Zero-day attacks continue to challenge the enterprise network security defense. A zero-day attack path is formed when a multi-step attack contains one or more zero-day exploits. Detecting zero-day attack paths in time could enable early disclosure of zero-day threats. In this paper, we propose a probabilistic approach to identify zero-day attack paths and implement a prototype system named ZePro....
Automatic detection of shout prosody in continuous speech signal involves examining changes in its production characteristics. Our recent study of electroglottograph signals highlighted that significant changes occur in the glottal excitation source characteristics during production of shouted speech, especially in the vowel contexts. But the differences between normal and shouted speech, in the production...
nowadays, privacy violations caused by third party services are usually addressed with blacklist approaches. Those approaches have limitation, as they are hard to maintain and need to be frequently updated to provide relevant information. Knowing these limitations, we study ability to identify third-party web trackers having corpus of http request between web resources and associated cookies. Cookies...
The Internet is a medium for people to communicate with each other. Individuals and/or organizations are faced with increased security threats on the Internet. Many organizations prioritize on handling external security threats over internal security threats and for this reason, internal security threats are often missed or worst ignored. Domain Name System (DNS) is one of major Internet services...
In recent years, there has been increased interest in real-world event identification using data collected from social media, where theWeb enables the general public to post real-time reactions to terrestrial events - thereby acting as social sensors of terrestrial activity. Automatically extracting and categorizing activity from streamed data is a non-trivial task. To address this task, we present...
The semiconductor counterfeiting has become a serious problem. Several Physical Unclonable Functions (PUFs), which utilizes the variation when manufacturing, are proposed as a countermeasure for imitation electronics. An arbiter PUF is one of the most popular PUFs. The operation of an arbiter PUF can be expressed by using a delay model. An arbiter PUF is reported to be attacked by forcing them to...
The traditional text classification methods usually follow this process: first, a sentence can be considered as a bag of words (BOW), then transformed into sentence feature vector which can be classified by some methods, such as maximum entropy (ME), Naive Bayes (NB), support vector machines (SVM), and so on. However, when these methods are applied to text classification, we usually can not obtain...
A technique has been presented to use ECG (Electrocardiogram) for human identification. Earlier researches were tested on PTB or MIT-BIH ECG data which was recorded once a person is at rest and will give erroneous results if the heart beat rate changes depending upon human activity. Hence time and amplitude normalization is necessary for identification. In this technique, R peaks of ECG signal are...
Multimodal Biometric systems have proved more secure as compared to unimodal systems. Multimodal fusion can be achieved by using three approaches which are Feature-level fusion, Score-level fusion and Decision-level fusion. This paper presents an approach which fuses left and right iris using feature level fusion using Haar wavelet, Cosine wavelet and Haar-Cosine Hybrid wavelet followed by Thepade's...
With the proliferation of Android apps, encounters with malicious apps (malware) by mobile users are on the rise as vulnerabilities in the Android platform system are exploited by malware authors to access personal or sensitive information with ill intentions, often with financial gain in mind. To uphold security integrity and maintain user confidence, various approaches have been studied in the field...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.