all InfoSec news
Mining Function Homology of Bot Loaders from Honeypot Logs. (arXiv:2206.00385v1 [cs.CR])
June 2, 2022, 1:20 a.m. | Yuhui Zhu, Zhenxiang Chen, Qiben Yan, Shanshan Wang, Enlong Li, Lizhi Peng, Chuan Zhao
cs.CR updates on arXiv.org arxiv.org
Self-contained loaders are widely adopted in botnets for injecting loading
commands and spawning new bots. While researchers can dissect bot clients to
get various information of botnets, the cloud-based and self-contained design
of loaders effectively hinders researchers from understanding the loaders'
evolution and variation using classic methods. The decoupled nature of bot
loaders also dramatically reduces the feasibility of investigating
relationships among clients and infrastructures. In this paper, we propose a
text-based method to investigate and analyze details of bot …
More from arxiv.org / cs.CR updates on arXiv.org
Jobs in InfoSec / Cybersecurity
SOC 2 Manager, Audit and Certification
@ Deloitte | US and CA Multiple Locations
Information Security Engineers
@ D. E. Shaw Research | New York City
Security Officer Hospital Mission Viejo
@ Allied Universal | Mission Viejo, CA, United States
Junior Offensive Cyber Security Researcher
@ Draper | Cambridge, MA, United States
Consultant reporting reglementaire
@ Talan | Luxembourg, Luxembourg
Chief Information Security Officer
@ Kantox | Barcelona, Catalonia, Spain