Computer and Information Sciences III 2012
DOI: 10.1007/978-1-4471-4594-3_35
|View full text |Cite
|
Sign up to set email alerts
|

On the Feasibility of Automated Semantic Attacks in the Cloud

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2015
2015
2016
2016

Publication Types

Select...
3
1

Relationship

3
1

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 4 publications
0
4
0
Order By: Relevance
“…On any system, the user interface is always vulnerable to abuse by authorised users, with or without their knowledge. Traditional deception-based attacks, such as phishing emails, spoofed websites and drive-by downloads, have shifted to new and emerging platforms in social media [2], cloud applications [3] and near field communications [4]. Efforts towards technical defence against semantic attacks have lead to the development of solutions that are typically specific in design.…”
Section: Introductionmentioning
confidence: 99%
“…On any system, the user interface is always vulnerable to abuse by authorised users, with or without their knowledge. Traditional deception-based attacks, such as phishing emails, spoofed websites and drive-by downloads, have shifted to new and emerging platforms in social media [2], cloud applications [3] and near field communications [4]. Efforts towards technical defence against semantic attacks have lead to the development of solutions that are typically specific in design.…”
Section: Introductionmentioning
confidence: 99%
“…The next stage in this work will involve the development of a technical system that can operate in both a corporate environment and external independent platform. Future research in this field can also investigate the feasibility of using human sensors for deception-based attacks in different environments, such as in the context of cloud computing (R. Heartfield and G. Loukas, 2013), the Internet of Things and cyber-physical systems (G. Loukas, 2015).…”
Section: Resultsmentioning
confidence: 99%
“…For example, a malicious URL may be presented via an email system on the Internet [Drake et al 2004] or an instant messaging program [Leavitt 2005;Lauinger et al 2010]. Malicious files can be served via synchronised cloud storage [Heartfield and Loukas 2013], malvertisements embedded in compromised web pages [Li et al 2012], automated bots in social network sites [Boshmaf et al 2011;Coburn and Marra 2008] or a stolen online gaming avatar used to gather information on a computer gaming system [Podhradsky et al 2013].…”
Section: Md1-lmentioning
confidence: 99%
“…For example, ".exe" is a well known executable extension and thus threat to the user's system if the file is malicious. However, the same caution is not exercised for other executable types, such as ".bat", ".ini", ".lnk", or ".scr" [Heartfield and Loukas 2013]. Moreoever, in Microsoft Windows, the file type and appropriate icon to be displayed are determined by extension.…”
Section: Dv: Deception Vectormentioning
confidence: 99%