Researchers propose Moving Target Defense (MTD) strategies for networking infrastructures as a countermeasure to impede attackers from identifying and exploiting vulnerable network hosts. In this paper, we investigate the weaknesses of Network-based …
In recent years, we witness the spreading of a significant variety of malware, which operate and propagate relying on network communications. Due to the staggering growth of traffic in the last years, detecting malicious software has become …
The prevalence of mobile malware has become a growing is-sue given the tight integration of mobile systems with our daily life. Mostmalware programs use URLs inside network traffic to forward commandsto launch malicious activities. Therefore, the …
In recent years, mobile devices (e.g., smartphones and tablets) have met an increasing commercial success and have become a fundamental element of the everyday life for billions of people all around the world. Mobile devices are used not only for …
The Internet of Things (IoT) paradigm, in conjunction with the one of smart cities, is pursuing toward the concept of smart buildings, i.e., 'intelligent' buildings able to receive data from a network of sensors and thus to adapt the environment. …
Mobile devices can be maliciously exploited to violate the privacy of people. In most attack scenarios, the adversary takes the local or remote control of the mobile device, by leveraging a vulnerability of the system, hence sending back the …
While smartphone usage become more and more pervasive,people start also asking to which extent such devices can bemaliciously exploited as “tracking devices”. The concern isnot only related to an adversary taking physical or remotecontrol of the …
While smartphone usage become more and more pervasive,people start also asking to which extent such devices can bemaliciously exploited as “tracking devices”. The concern isnot only related to an adversary taking physical or remotecontrol of the …