Skip to main content

Showing 1–3 of 3 results for author: Tabari, A Z

Searching in archive cs. Search in all archives.
.
  1. arXiv:2401.17459  [pdf, ps, other

    cs.CR cs.AI

    A Preliminary Study on Using Large Language Models in Software Pentesting

    Authors: Kumar Shashwat, Francis Hahn, Xinming Ou, Dmitry Goldgof, Lawrence Hall, Jay Ligatti, S. Raj Rajgopalan, Armin Ziaie Tabari

    Abstract: Large language models (LLM) are perceived to offer promising potentials for automating security tasks, such as those found in security operation centers (SOCs). As a first step towards evaluating this perceived potential, we investigate the use of LLMs in software pentesting, where the main task is to automatically identify software security vulnerabilities in source code. We hypothesize that an L… ▽ More

    Submitted 30 January, 2024; originally announced January 2024.

  2. arXiv:2112.10974  [pdf, other

    cs.CR cs.LG

    What are Attackers after on IoT Devices? An approach based on a multi-phased multi-faceted IoT honeypot ecosystem and data clustering

    Authors: Armin Ziaie Tabari, Xinming Ou, Anoop Singhal

    Abstract: The growing number of Internet of Things (IoT) devices makes it imperative to be aware of the real-world threats they face in terms of cybersecurity. While honeypots have been historically used as decoy devices to help researchers/organizations gain a better understanding of the dynamic of threats on a network and their impact, IoT devices pose a unique challenge for this purpose due to the variet… ▽ More

    Submitted 20 December, 2021; originally announced December 2021.

    Comments: arXiv admin note: text overlap with arXiv:2003.01218

  3. arXiv:2003.01218  [pdf, other

    cs.CR

    A First Step Towards Understanding Real-world Attacks on IoT Devices

    Authors: Armin Ziaie Tabari, Xinming Ou

    Abstract: With the rapid growth of Internet of Things (IoT) devices, it is imperative to proactively understand the real-world cybersecurity threats posed to them. This paper describes our initial efforts towards building a honeypot ecosystem as a means to gathering and analyzing real attack data against IoT devices. A primary condition for a honeypot to yield useful insights is to let attackers believe the… ▽ More

    Submitted 2 March, 2020; originally announced March 2020.