Security

Our dataset is constructed by leveraging existing malware samples and utilizing both UTRDCL and traditional DCL techniques to load the malicious components, thereby launching attacks. In addition to the malware samples themselves, we also provide online detection reports from reputable sources, including VirusTotal, MobSF, and Bazaar (Pithus). These reports offer a comprehensive analysis of the malware samples, enabling researchers to gain a deeper understanding of the attacks and their characteristics.

Categories:
84 Views

Recent advances in generative visual content have led to a quantum leap in the quality of artificially generated Deepfake content. Especially, diffusion models are causing growing concerns among communities due to their ever-increasing realism. However, quantifying the realism of generated content is still challenging. Existing evaluation metrics, such as Inception Score and Fréchet inception distance, fall short on benchmarking diffusion models due to the versatility of the generated images.

Categories:
166 Views

The softwarization and virtualization of the fifth-generation (5G) cellular networks bring about increased flexibility and faster deployment of new services. However, these advancements also introduce new vulnerabilities and unprecedented attack surfaces. The cloud-native nature of 5G networks mandates detecting and protecting against threats and intrusions in the cloud systems.

Categories:
344 Views

This dataset presents real-world VPN encrypted traffic flows captured from five applications that belong to four service categories, which reflect typical usage patterns encountered by everyday users. 

Our methodology utilized a set of automatic scripts to simulate real-world user interactions for these applications, to achieve a low level of noise and irrelevant network traffic.

 

The dataset consists of flow data collected from four service categories:

Categories:
468 Views

Common Randomness (CR) can be considered as a resource in our future communication systems that will assist in various operations, such as cryptographic encryption in wireless communication, improving identification capacity for identification codes. In wireless communication, CR can be conveniently generated by reading the reciprocal channel properties between two wireless terminals, and by sending pilot signals to each other using the time division duplexing (TDD)-based half-duplexing method. In the channel probing stage, reciprocal channel characteristics are measured.

Categories:
218 Views

Resource usage fuzzing samples and related data. Contains samples from Pythoin, random data, GPT-3.5, GPT-4, Gemini-1.0, Claude Instant, and Claude Opus. These samples are generated for 50 Python functions. Also included are resource measures for CPU time, instruction count, function calls, peak RAM usage, final RAM allocated, and coverage. These values were collected on an isolated system and account for interference from other processes.

Categories:
90 Views

This data set includes GAMS codes for the manuscript titled "Optimizing Unmanned Air Vehicle (UAV) Base Locations: A multi-objective optimization approach". There are four mixed integer programming models (M1, M2, M3 and M4) and one multi-objective algorithm (Alg1) coded in GAMS. The data used for the models are embeded in  the codes. The codes should be run in GAMS environment. Each code gives the optimal solution for the associated model in which optimal objective function and decision variables values are provided. 

 

Categories:
169 Views

This study investigates the integration of artificial intelligence (AI) to enhance endpoint management solutions. The research explores AI's impact on security, efficiency, and compliance within enterprise environments (R1). Through case studies and empirical analysis, the paper highlights the benefits and challenges of such integrations, offering insights into future developments.

Categories:
4391 Views

This dataset contains detailed NIST test suite measurements for both the NIST SP 800-22 statistical and NIST SP 800-90B entropy source test suite relevant to the paper "Towards a Practical Runtime-Accessible True Random Number Generator Based on Commercial Off-The-Shelf Resistive Random Access Memory Modules". In this work, ReRAM modules of two different manufacturers (Adesto Technologies and Fujitsu) have been tested, providing almost equally good results.

Categories:
130 Views

With the wide adoption, Linux-based IoT devices have emerged as one primary target of today’s cyber attacks. While traditional malware-based attacks (e.g., Mirai) can quickly spread across these devices, they are well-understood threats with defense techniques such as malware fingerprinting coupled with community-based fingerprint sharing. Recently, fileless attacks—attacks that do not rely on malware files—have been increasingly occurring on Linux-based IoT devices.

Categories:
119 Views

Pages