Найти в Дзене
Tech papers & research's review

Tech papers & research's review

Information technology (IT) has become a phenomenon that every organization embraces in the modern society. Many scholars have written articles regarding the same where Information Technology is a do or die scenario
подборка · 16 материалов
1 год назад
Leveraging Energy Consumption Patterns for Cyberattack Detection in IoT Systems
This document provides a comprehensive analysis of the energy consumption of smart devices during cyberattacks, focusing on various aspects critical to understanding and mitigating these threats: types of cyberattacks, detection techniques, benefits and drawbacks, applicability across industries, integration options. This qualitative analysis provides valuable insights for cybersecurity professionals, IoT specialists, and industry stakeholders. The analysis is beneficial for enhancing the security...
1 год назад
CVE-2024-27130 in QNAP: When 'Secure' is Just a Marketing Term
The article «QNAP QTS — QNAPping At The Wheel (CVE-2024-27130 and friends)» from WatchTowr Labs provides a detailed analysis of several vulnerabilities found in QNAP NAS devices. CVE-2024-27130. Stack Buffer Overflow in share.cgi: The vulnerability arises from the unsafe use of the strcpy function in the No_Support_ACL function, which is accessible via the get_file_size function in share.cgi. This leads to a stack buffer overflow, which can be exploited to achieve Remote Code Execution (RCE). Attack...
1 год назад
MalPurifier. Detoxifying Your Android, One Malicious Byte at a Time
Another document to analyze. This time, it’s the riveting «MalPurifier: Enhancing Android Malware Detection with Adversarial Purification against Evasion Attacks.» Because, you know, the world really needed another paper on Android malware detection. First, we’ll dive into the Introduction and Motivation to understand why yet another solution to the ever-escalating threats of Android malware is necessary. Spoiler alert: it’s because current machine learning-based approaches are as vulnerable as a house of cards in a windstorm...
1 год назад
When Velociraptors Meet VMs. A Forensic Fairytale
Welcome to the riveting world of forensic analysis on VMware ESXi environments using Velociraptor, the tool that promises to make your life just a tad bit easier. Velociraptor, with its advanced forensic techniques, is tailored to the complexities of virtualized server infrastructures. It’s like having a Swiss Army knife for your forensic needs, minus the actual knife. Whether you’re dealing with data extraction, log analysis, or identifying malicious activities, Velociraptor has got you covered...
1 год назад
MS-DOS: For those who think modern OSes are too user-friendly
The release of the MS-DOS source code is significant for educational purposes, historical preservation, community engagement, and as a technical reference, making it a valuable resource even in the modern era. Educational Value: 📌Learning Tool: The source code provides a valuable resource for students and new programmers to study the fundamentals of operating system development. It offers insights into low-level programming, particularly in assembly language, which is crucial for understanding how early operating systems managed hardware and resources...
1 год назад
Human Factors in Biocybersecurity Wargames & Gamification
The paper «Human Factors in Biocybersecurity Wargames» offers a thrilling guide to safeguarding bioprocessing centers. The authors, clearly having too much time on their hands, emphasize the «fast-paced» nature of biological and bioprocessing developments. Labs, whether rolling in cash or scraping by, are apparently prime targets for cyber mischief. Who knew that underpaid workers and sub-standard resources could be security risks? The paper also highlights the importance of wargames. Yes, wargames...