enter search term and/or author name
Efficient and Accurate Behavior-Based Tracking of Malware-Control Domains in Large ISP Networks
Babak Rahbarinia, Roberto Perdisci, Manos Antonakakis
Article No.: 4
In this article, we propose Segugio, a novel defense system that allows for efficiently tracking the occurrence of new malware-control domain names in very large ISP networks. Segugio passively monitors the DNS traffic to build a...
Detection of Rogue Certificates from Trusted Certificate Authorities Using Deep Neural Networks
Zheng Dong, Kevin Kane, L. Jean Camp
Article No.: 5
Rogue certificates are valid certificates issued by a legitimate certificate authority (CA) that are nonetheless untrustworthy; yet trusted by web browsers and users. With the current public key infrastructure, there exists a window of...
MAC Precomputation with Applications to Secure Memory
Juan A. Garay, Vladimir Kolesnikov, Rae Mclellan
Article No.: 6
We present Shallow MAC (ShMAC), a fixed-input-length message authentication code that performs most of the computation prior to the availability of the message. Specifically, ShMAC’s message-dependent computation is much faster and...