Browsing Library by Author "Ming, Jiang"
Now showing items 1-12 of 12
-
CRYPTO RANSOMWARE ANALYSIS AND DETECTION USING PROCESS MONITOR
Kardile, Ashwini Balkrushna; 0000-0003-1535-9019 (2017-12-07)Ransomware is a faster growing threat that encrypts user’s files and locks the computer and holds the key required to decrypt the files for ransom. Over the past few years, the impact of ransomware has increased exponentially. ... -
Defending Neural Networks Against Adversarial Examples
Barton, Armon; 0000-0002-5372-1480 (2018-12-12)Deep learning is becoming a technology central to the safety of cars, the security of networks, and the correct functioning of many other types of systems. Unfortunately, attackers can create adversarial examples, small ... -
Effective Crypto Ransomware Detection Using Hardware Performance Counters
Podolanko, John (2019-05-16)Systems affected by malware in the past 10 years has risen from 29 million to 780 million, which tells us it is a rapidly growing threat. Viruses, ransomware, worms, backdoors, botnets, etc. all come under malware. Ransomware ... -
Fuzz Testing of Zigbee Protocol Implementations
Ren, Mengfei; 0000-0001-8548-3299 (2023-07-12)In recent years, we have witnessed the increasing of the Internet of Things (IoT) devices deployed by many areas, such as home automation, healthcare, manufacture, and smart vehicle. Among the numerous IoT wireless standards ... -
INVESTIGATING THE EFFECT OF PEEPHOLE OPTIMIZATIONS ON BINARY CODE DIFFERENCES
Ren, Xiaolei (2023-09-01)**Please note that the full text is embargoed until 8/1/2025** ABSTRACT: Binary diffing is a technique used to compare and identify differences or similarities in executable files without access to source code. The potential ... -
ON THE FEASIBILITY OF MALWARE UNPACKING WITH HARDWARE PERFORMANCE COUNTERS
Patel, Jay Mayank (2019-05-08)Most of the malware authors use Packers, to compress an executable file and attach a stub, to the file containing the code, to decompress it at runtime, which will turn a known piece of malware into something new, that ... -
One Size Does Not Fit All: Security Hardening of MIPS Embedded Systems via Static Binary Debloating for Shared Libraries
Zhang, Haotian; Ren, Mengfei; Lei, Yu; Ming, Jiang (ACM, 2022-02-22)Embedded systems have become prominent targets for cyberattacks. To exploit firmware’s memory corruption vulnerabilities, cybercriminals harvest reusable code gadgets from the large shared library codebase (e.g., uClibc). ... -
Practical Indirect Control Flow Analysis for Binary Executables
Zhang, Haotian; 0000-0003-0844-3730 (2023-04-27)Resolving indirect control flow is one of the fundamental challenges in binary analysis. Improving the accuracy of the indirect control flow analysis is vital to the binary analysis domain. Many analysis algorithms and ... -
Security Analysis of Zigbee Protocol Implementation via Device-agnostic Fuzzing
Ren, Mengfei; Ren, Xiaolei; Feng, Huadong; Ming, Jiang; Lei, Yu (ACM, 2023-03)Zigbee is widely adopted as a resource-efficient wireless protocol in the IoT network. IoT devices from manufacturers have recently been affected due to major vulnerabilities in Zigbee protocol implementations. Security ... -
STATEFUL DETECTION OF STEALTHY BEHAVIORS IN ANDROID APPS
Junaid, Mohsin; 0000-0002-8928-9917 (2017-08-08)The number of smartphones has increased greatly during the last few years. Among the popular mobile operating systems (such as iOS and Android) installed on these devices, Android captures most of the mobile market share. ... -
Unleashing the Hidden Power of Compiler Optimization on Binary Code Difference: An Empirical Study
Ren, Xialei; Ho, Michael; Ming, Jiang; Lei, Yu; Li, Li (ACM, 2021-06-20)Hunting binary code difference without source code (i.e., binary diffing) has compelling applications in software security. Due to the high variability of binary code, existing solutions have been driven towards measuring ... -
Z-Fuzzer: Device-agnostic Fuzzing of Zigbee Protocol Implementation
Ren, Mengfei; Ren, Xiaolei; Feng, Huadong; Ming, Jiang; Lei, Yu (ACM, 2021-07-02)With the proliferation of the Internet of Things (IoT) devices, Zigbee is widely adopted as a resource-efficient wireless protocol. Recently, severe vulnerabilities in Zigbee protocol implementations have compromised ...