Skip to main content

Showing 1–5 of 5 results for author: Spaulding, J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2103.14217  [pdf, other

    cs.CR

    Understanding Internet of Things Malware by Analyzing Endpoints in their Static Artifacts

    Authors: Afsah Anwar, **chun Choi, Abdulrahman Alabduljabbar, Hisham Alasmary, Jeffrey Spaulding, An Wang, Songqing Chen, DaeHun Nyang, Amro Awad, David Mohaisen

    Abstract: The lack of security measures among the Internet of Things (IoT) devices and their persistent online connection gives adversaries a prime opportunity to target them or even abuse them as intermediary targets in larger attacks such as distributed denial-of-service (DDoS) campaigns. In this paper, we analyze IoT malware and focus on the endpoints reachable on the public Internet, that play an essent… ▽ More

    Submitted 25 March, 2021; originally announced March 2021.

  2. arXiv:1904.03487  [pdf, other

    cs.CR

    Exploring the Attack Surface of Blockchain: A Systematic Overview

    Authors: Muhammad Saad, Jeffrey Spaulding, Laurent Njilla, Charles Kamhoua, Sachin Shetty, DaeHun Nyang, Aziz Mohaisen

    Abstract: In this paper, we systematically explore the attack surface of the Blockchain technology, with an emphasis on public Blockchains. Towards this goal, we attribute attack viability in the attack surface to 1) the Blockchain cryptographic constructs, 2) the distributed architecture of the systems using Blockchain, and 3) the Blockchain application context. To each of those contributing factors, we ou… ▽ More

    Submitted 6 April, 2019; originally announced April 2019.

  3. arXiv:1902.03531  [pdf, other

    cs.NI

    Analyzing Endpoints in the Internet of Things Malware

    Authors: **chun Choi, Afsah Anwar, Hisham Alasmary, Jeffrey Spaulding, DaeHun Nyang, Aziz Mohaisen

    Abstract: The lack of security measures in the Internet of Things (IoT) devices and their persistent online connectivity give adversaries an opportunity to target them or abuse them as intermediary targets for larger attacks such as distributed denial-of-service (DDoS) campaigns. In this paper, we analyze IoT malware with a focus on endpoints to understand the affinity between the dropzones and their target… ▽ More

    Submitted 9 February, 2019; originally announced February 2019.

    Comments: 2 pages, 1 figure, Accepted as a poster for ISOC NDSS 2019

  4. arXiv:1606.07080  [pdf, ps, other

    cs.CR

    Domain Name System Security and Privacy: Old Problems and New Challenges

    Authors: Ah Reum Kang, Jeffrey Spaulding, Aziz Mohaisen

    Abstract: The domain name system (DNS) is an important protocol in today's Internet operation, and is the standard naming convention between domain names, names that are easy to read, understand, and remember by humans, to IP address of Internet resources. The wealth of research activities on DNS in general and security and privacy in particular suggest that all problems in this domain are solved. Reality h… ▽ More

    Submitted 22 June, 2016; originally announced June 2016.

  5. arXiv:1603.02767  [pdf, ps, other

    cs.CR

    The Landscape of Domain Name Typosquatting: Techniques and Countermeasures

    Authors: Jeffrey Spaulding, Shambhu Upadhyaya, Aziz Mohaisen

    Abstract: With more than 294 million registered domain names as of late 2015, the domain name ecosystem has evolved to become a cornerstone for the operation of the Internet. Domain names today serve everyone, from individuals for their online presence to big brands for their business operations. Such ecosystem that facilitated legitimate business and personal uses has also fostered "creative" cases of misu… ▽ More

    Submitted 8 March, 2016; originally announced March 2016.

    Comments: 6 pages, 1 table, 0 figures