Skip to main content

Showing 1–8 of 8 results for author: Sadeghiyan, B

Searching in archive cs. Search in all archives.
.
  1. arXiv:2209.07215  [pdf, other

    cs.CR cs.LG

    ProAPT: Projection of APT Threats with Deep Reinforcement Learning

    Authors: Motahareh Dehghan, Babak Sadeghiyan, Erfan Khosravian, Alireza Sedighi Moghaddam, Farshid Nooshi

    Abstract: The highest level in the Endsley situation awareness model is called projection when the status of elements in the environment in the near future is predicted. In cybersecurity situation awareness, the projection for an Advanced Persistent Threat (APT) requires predicting the next step of the APT. The threats are constantly changing and becoming more complex. As supervised and unsupervised learnin… ▽ More

    Submitted 15 September, 2022; originally announced September 2022.

  2. arXiv:2112.05429  [pdf, other

    cs.CR

    An Evaluation and Enhancement of Seredynski-Bouvry CA-based Encryption Scheme

    Authors: Hossein Arabnezhad, Babak Sadeghiyan

    Abstract: In this paper, we study a block cipher based on cellular automata, proposed by Seredynski and Bouvry in \cite{semabo04} against \emph{plain-text avalanche criteria} and \emph{randomness} tests. Our experiments shows that Seredynski-Bouvry encryption scheme does not pass some NIST statistical tests by neighborhood radius less than three. It also showed that if the CA rule is selected carelessly, it… ▽ More

    Submitted 10 December, 2021; originally announced December 2021.

    Comments: 11 pages, 10 Figures

    MSC Class: 94A60

  3. Reconstruction of Worm Propagation Path Using a Trace-back Approach

    Authors: Sara Asgari, Babak Sadeghiyan

    Abstract: Worm origin identification and propagation path reconstruction are essential problems in digital forensics. However, a small number of studies have specifically investigated these problems so far. In this paper, we extend a distributed trace-back algorithm, called Origins, which is only able to identify the origins of fast-spreading worms. We make some modifications to this algorithm so that in ad… ▽ More

    Submitted 17 August, 2021; originally announced August 2021.

  4. arXiv:2011.00319  [pdf

    cs.CG cs.CR

    A Secure Two-Party Computation Protocol for Intersection Detection between Two Convex Hulls

    Authors: Amirahmad Chapnevis, Babak Sadeghiyan

    Abstract: Intersection detection between three-dimensional bodies has various applications in computer graphics, video game development, robotics as well as military industries. In some respects, entities do not want to disclose sensitive information about themselves, including their location. In this paper, we present a secure two-party protocol to determine the existence of an intersection between entitie… ▽ More

    Submitted 21 May, 2021; v1 submitted 31 October, 2020; originally announced November 2020.

    Comments: 11 Pages, 2 Tables, 40 formulas, and 6 figures This paper is presented in CSICC2019, Computer Society of Iran Computer Conference, Sharif University of Technology, Tehran 2019

  5. Towards Generating Benchmark Datasets for Worm Infection Studies

    Authors: Sara Asgari, Babak Sadeghiyan

    Abstract: Worm origin identification and propagation path reconstruction are among the essential problems in digital forensics. Until now, several methods have been proposed for this purpose. However, evaluating these methods is a big challenge because there are no suitable datasets containing both normal background traffic and worm traffic to evaluate these methods. In this paper, we investigate different… ▽ More

    Submitted 30 May, 2021; v1 submitted 9 June, 2020; originally announced June 2020.

  6. Reconstruction of C&C Channel for P2P Botnet

    Authors: Mohammad Jafari Dehkordi, Babak Sadeghiyan

    Abstract: Breaking down botnets have always been a big challenge. The robustness of C&C channels is increased, and the detection of botmaster is harder in P2P botnets. In this paper, we propose a probabilistic method to reconstruct the topologies of the C&C channel for P2P botnets. Due to the geographic dispersion of P2P botnet members, it is not possible to supervise all members, and there does not exist a… ▽ More

    Submitted 8 April, 2020; v1 submitted 10 April, 2019; originally announced April 2019.

    Comments: This paper is a preprint of a paper accepted by IET Communications and is subject to Institution of Engineering and Technology Copyright. When the final version is published, the copy of record will be available at the IET Digital Library

    Journal ref: https://digital-library.theiet.org/content/journals/10.1049/iet-com.2018.5286

  7. arXiv:1811.10448  [pdf, other

    cs.SE cs.CR

    ConsiDroid: A Concolic-based Tool for Detecting SQL Injection Vulnerability in Android Apps

    Authors: Ehsan Edalat, Babak Sadeghiyan, Fatemeh Ghassemi

    Abstract: In this paper, we present a concolic execution technique for detecting SQL injection vulnerabilities in Android apps, with a new tool we called ConsiDroid. We extend the source code of apps with mocking technique, such that the execution of original source code is not affected. The extended source code can be treated as Java applications and may be executed by SPF with concolic execution. We autom… ▽ More

    Submitted 8 August, 2019; v1 submitted 26 November, 2018; originally announced November 2018.

  8. arXiv:1811.01190  [pdf, other

    cs.CR

    Malware Dynamic Analysis Evasion Techniques: A Survey

    Authors: Amir Afianian, Salman Niksefat, Babak Sadeghiyan, David Baptiste

    Abstract: The Cyber world is plagued with ever-evolving malware that readily infiltrates all defense mechanisms, operates viciously unbeknownst to the user and surreptitiously exfiltrate sensitive data. Understanding the inner workings of such malware provides a leverage to effectively combat them. This understanding, is pursued through dynamic analysis which is conducted manually or automatically. Malware… ▽ More

    Submitted 3 November, 2018; originally announced November 2018.

    Comments: 33 pages, 1 figure, two tables