2020
DOI: 10.1007/978-3-030-42051-2_15
|View full text |Cite
|
Sign up to set email alerts
|

dAPTaset: A Comprehensive Mapping of APT-Related Data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 7 publications
(13 citation statements)
references
References 2 publications
0
12
0
Order By: Relevance
“…To compare the approaches, we rely on the data provided by dAPTaset [12]. It is a publicly available database 4 with different information about APTs activities, including various Indicators of Compromise like malware hashes, network domains, and IP addresses.…”
Section: Features Extractionmentioning
confidence: 99%
“…To compare the approaches, we rely on the data provided by dAPTaset [12]. It is a publicly available database 4 with different information about APTs activities, including various Indicators of Compromise like malware hashes, network domains, and IP addresses.…”
Section: Features Extractionmentioning
confidence: 99%
“…It contains several vulnerable binaries compiled with 11 compilers in the families of clang, gcc and icc. The total number of different vulnerabilities is 8 13 . We disassembled the dataset with ANGR, obtaining 3160 binary functions.…”
Section: Task 3 -Vulnerability Searchmentioning
confidence: 99%
“…Dataset: -We use the APT dataset from [13]. The dataset contains the mapping between malware and APT developers, it has been created by using public reports 18 of APT activites.…”
Section: E Task 5 -Apt Classificationmentioning
confidence: 99%
See 2 more Smart Citations