Pub Crawl - October 2024

Pub Crawl - October 2024

Selections by dgoff

Pub Crawl summarizes sets of publications that have been peer-reviewed and presented at Science of Security (SoS) conferences or referenced in current work. The topics are chosen for their usefulness for current researchers. Select the topic name to view the corresponding list of publications. Submissions and suggestions are welcome.

Submitted by Gregory Rigby on

"New Algorithm Identifies Increase in Critical Infrastructure Security Vulnerabilities"

"New Algorithm Identifies Increase in Critical Infrastructure Security Vulnerabilities"

A team of researchers at the Georgia Tech School of Electrical and Computer Engineering (ECE) has developed an algorithm named "PLCHound" to improve critical infrastructure security. The development aims to more accurately identify devices vulnerable to remote cyberattacks. It involves the use of advanced Natural Language Processing (NLP) and Machine Learning (ML) techniques to search through large databases of Internet records as well as log the IP address and security of Internet-connected devices.

Submitted by Gregory Rigby on

"Using Generative AI to Outsmart Cyberattackers Before They Strike"

"Using Generative AI to Outsmart Cyberattackers Before They Strike"

According to Mohamed Rahouti, a professor at Fordham University, generative Artificial Intelligence (GenAI) holds the key to a new system that anticipates potential cyberattacks and prepares systems to counter previously unknown cyber threats. He and a group of graduate students are developing new systems to get ahead of sophisticated, constantly changing attacks. The researchers have used GenAI and other methods in one of their projects to expand on a snapshot of network traffic data and create a more complete picture of what is normal and abnormal.

Submitted by Gregory Rigby on

"PhD Student to Present Paper at Cybersecurity Conference"

"PhD Student to Present Paper at Cybersecurity Conference"

Mir Ali Masood, PhD student at the University of Illinois Chicago, co-presents a paper titled "Unbundle-Rewrite-Rebundle: Runtime Detection and Rewriting of Privacy-Harming Code in JavaScript Bundles" at the 2024 ACM Computer and Communication Security (CCS) conference. The paper presents a tool developed by a team of researchers looking to improve web browsing privacy. Their tool unbundles code that tracks users from code used for website functionality. The team found a way to break down scripts, check each component, and fix privacy-harming or tracking code.

Submitted by Gregory Rigby on

"UTSA Researchers Reveal Oversight in AI Image Recognition Tools"

"UTSA Researchers Reveal Oversight in AI Image Recognition Tools"

Researchers at the University of Texas at San Antonio (UTSA) have developed a proprietary attack named "AlphaDog" to study how hackers can exploit an oversight in Artificial Intelligence (AI) image recognition tools. AI can help people process and understand large amounts of data with precision. However, the new study points out that the modern image recognition platforms and computer vision models built into AI often overlook the "alpha channel," an essential back-end feature that controls the transparency of images.

Submitted by Gregory Rigby on

"For AI, Secrecy Often Doesn't Improve Security"

"For AI, Secrecy Often Doesn't Improve Security"

A team of researchers has concluded that limiting public access to the underlying structures of Artificial Intelligence (AI) systems could have several consequences. They have gone into detail about the threats posed by the misuse of AI systems in areas such as disinformation, hacking, and more. The researchers assessed each risk and delved into whether there are more effective ways to combat it than restricting access to AI models.

Submitted by Gregory Rigby on

"Google Warns of Samsung Zero-Day Exploited in the Wild"

"Google Warns of Samsung Zero-Day Exploited in the Wild"

Security researchers at Google's Threat Analysis Group recently discovered a zero-day vulnerability in Samsung's mobile processors that has been leveraged as part of an exploit chain for arbitrary code execution.  Tracked as CVE-2024-44068 (CVSS score of 8.1) and patched as part of Samsung's October 2024 set of security fixes, the issue is described as a use-after-free bug that could be abused to escalate privileges on a vulnerable Android device.

Submitted by Adam Ekwall on

"75% of US Senate Campaign Websites Fail to Implement DMARC"

"75% of US Senate Campaign Websites Fail to Implement DMARC"

A new report by security researchers at Red Shift claims that nearly 75% of US Senate campaign websites lack Domain-based Message Authentication, Reporting, and Conformance (DMARC) protections, leaving them vulnerable to cyberattacks.  The researchers noted that there is an urgent need for campaigns to strengthen cybersecurity, especially with the critical role email communications play in coordinating with voters, donors, and staff.  DMARC is a key tool in preventing phishing and spoofing attacks by ensuring emails sent from a domain are authenticated.

Submitted by Adam Ekwall on

"AI-Powered Attacks Flood Retail Websites"

"AI-Powered Attacks Flood Retail Websites"

According to security researchers at Imperva, in the last six months, retailers experienced over half a million (569,884) AI-driven attacks per day.  These attacks originate from AI tools like ChatGPT, Claude, and Gemini, alongside specialized bots designed to scrape websites for LLM training data.  The researchers observed a range of AI-driven threats, including bots, distributed denial of service (DDoS) attacks, API violations, and business logic abuse.

Submitted by Adam Ekwall on
Subscribe to