Skip to main content

Showing 1–4 of 4 results for author: Lai, A C

Searching in archive cs. Search in all archives.
.
  1. arXiv:2502.02335  [pdf

    cs.CR

    Target Attack Backdoor Malware Analysis and Attribution

    Authors: Anthony Cheuk Tung Lai, Vitaly Kamluk, Alan Ho, Ping Fan Ke, Byron Wai

    Abstract: Backdoor Malware are installed by an attacker on the victim's server(s) for authorized access. A customized backdoor is weaponized to execute unauthorized system, database and application commands to access the user credentials and confidential digital assets. Recently, we discovered and analyzed a targeted persistent module backdoor in Web Server in an online business company that was undetectabl… ▽ More

    Submitted 5 February, 2025; v1 submitted 4 February, 2025; originally announced February 2025.

    Comments: 12 pages, 8 figures, 2 tables, DFRWS

  2. arXiv:2502.02230  [pdf

    cs.CR

    An Attack-Driven Incident Response and Defense System (ADIRDS)

    Authors: Anthony Cheuk Tung Lai, Siu Ming Yiu, Ping Fan Ke, Alan Ho

    Abstract: One of the major goals of incident response is to help an organization or a system owner to quickly identify and halt the attacks to minimize the damages (and financial loss) to the system being attacked. Typical incident responses rely very much on the log information captured by the system during the attacks and if needed, may need to isolate the victim from the network to avoid further destruct… ▽ More

    Submitted 4 February, 2025; originally announced February 2025.

    Comments: 18 pages, 3 figures, 4 tables

  3. arXiv:2502.01221  [pdf

    cs.CR

    Ransomware IR Model: Proactive Threat Intelligence-Based Incident Response Strategy

    Authors: Anthony Cheuk Tung Lai, Ping Fan Ke, Alan Ho

    Abstract: Ransomware impact different organizations for years, it causes huge monetary, reputation loss and operation impact. Other than typical data encryption by ransomware, attackers can request ransom from the victim organizations via data extortion, otherwise, attackers will publish stolen data publicly in their ransomware dashboard forum and data-sharing platforms. However, there is no clear and prove… ▽ More

    Submitted 3 February, 2025; originally announced February 2025.

    Comments: 10 pages, 1 figure, 2 tables, case study

  4. arXiv:1012.3721  [pdf, ps, other

    cs.FL cs.DM math.DS math.NT

    Negative bases and automata

    Authors: Christiane Frougny, Anna Chiara Lai

    Abstract: We study expansions in non-integer negative base -β introduced by Ito and Sadahiro. Using countable automata associated with (-β)-expansions, we characterize the case where the (-β)-shift is a system of finite type. We prove that, if β is a Pisot number, then the (-β)-shift is a sofic system. In that case, addition (and more generally normalization on any alphabet) is realizable by a finite transd… ▽ More

    Submitted 16 December, 2010; originally announced December 2010.