Paper-Conference

EKHunter: A Counter-Offensive Toolkit for Exploit Kit Infiltration featured image

EKHunter: A Counter-Offensive Toolkit for Exploit Kit Infiltration

The emergence of exploit kits is one of the most important developments in modern cybercrime. Much of cybersecurity research in the recent years has been devoted towards defending …

avatar
Birhanu Eshete
WebWinnow: Leveraging exploit kit workflows to detect malicious URLs featured image

WebWinnow: Leveraging exploit kit workflows to detect malicious URLs

Organized cybercrime on the Internet is proliferating due to exploit kits. Attacks launched through these kits include drive-by-downloads, spam and denial-of-service. In this …

avatar
Birhanu Eshete
SAMo: Experimenting a Social Accountability Web Platform featured image

SAMo: Experimenting a Social Accountability Web Platform

The need for transparency and quality control of public ser- vices is crucial for a sustainable development of underserved communities. Information and data collection play a sig- …

avatar
aaron-ciaghi
EINSPECT: Evolution-Guided Analysis and Detection of Malicious Web Pages featured image

EINSPECT: Evolution-Guided Analysis and Detection of Malicious Web Pages

Most existing work to thwart malicious web pages capture maliciousness via discriminative artifacts, learn a model, and detect by leveraging static and/or dynamic analysis. …

avatar
Birhanu Eshete
Effective Analysis, Characterization, and Detection of Malicious Web Pages featured image

Effective Analysis, Characterization, and Detection of Malicious Web Pages

he steady evolution of the Web has paved the way for miscreants to take advantage of vulnerabilities to embed malicious content into web pages. Up on a visit, malicious web pages …

avatar
Birhanu Eshete
ConfEagle: Automated Analysis of Security Configuration Vulnerabilities in Web Applications featured image

ConfEagle: Automated Analysis of Security Configuration Vulnerabilities in Web Applications

Web applications and server environments hosting them rely on configuration settings that influence their security, usability, and performance. Misconfiguration results in severe …

avatar
Birhanu Eshete
Social Accountability for Mozambique: an Experience Report from the Moamba District featured image

Social Accountability for Mozambique: an Experience Report from the Moamba District

Empowering citizens in making Governments more accountable and transparent in the services they provide has gained more attention in the last few years both in the developing and …

avatar
aaron-ciaghi
BINSPECT: Holistic Analysis and Detection of Malicious Web Pages featured image

BINSPECT: Holistic Analysis and Detection of Malicious Web Pages

Malicious web pages are among the major security threats on the Web. Most of the existing techniques for detecting malicious web pages focus on specific attacks. Unfortunately, …

avatar
Birhanu Eshete
Measuring the Impact of Different Metrics on Software Quality: a Case Study in the Open Source Domain featured image

Measuring the Impact of Different Metrics on Software Quality: a Case Study in the Open Source Domain

Knowledge about the expected impact of different project and technological choices is fundamental for project planning, resource allocation, and quality of the final software …

avatar
valentino-sartori
Malicious Website Detection: Effectiveness and Efficiency Issues featured image

Malicious Website Detection: Effectiveness and Efficiency Issues

Malicious websites, when visited by an unsuspecting victim infect her machine to steal invaluable information, redirect her to malicious targets or compromise her system to mount …

avatar
Birhanu Eshete