Skip to main content

Journal of Computer Virology and Hacking Techniques OnlineFirst articles

Open Access 12.04.2024 | Original Paper

Sniping at web applications to discover input-handling vulnerabilities

Web applications play a crucial role in modern businesses, offering various services and often exposing sensitive data that can be enticing to attackers. As a result, there is a growing interest in finding innovative approaches for discovering …

verfasst von:
Ciro Brandi, Gaetano Perrone, Simon Pietro Romano

Open Access 06.04.2024 | Original Paper

A comparison of adversarial malware generators

Machine learning has proven to be a valuable tool for automated malware detection, but machine learning systems have also been shown to be subject to adversarial attacks. This paper summarizes and compares related work on generating adversarial …

verfasst von:
Pavla Louthánová, Matouš Kozák, Martin Jureček, Mark Stamp, Fabio Di Troia

18.03.2024 | Original Paper

Some remarks on how to hash faster onto elliptic curves

This article proposes four optimizations of indifferentiable hashing onto (prime-order subgroups of) ordinary elliptic curves over finite fields $$\mathbb {F}_{q}$$ F q . One of them is dedicated to elliptic curves E without non-trivial …

verfasst von:
Dmitrii Koshelev

Open Access 18.03.2024 | Original Paper

Creating valid adversarial examples of malware

Because of its world-class results, machine learning (ML) is becoming increasingly popular as a go-to solution for many tasks. As a result, antivirus developers are incorporating ML models into their toolchains. While these models improve malware …

verfasst von:
Matouš Kozák, Martin Jureček, Mark Stamp, Fabio Di Troia

16.03.2024 | Original Paper

Use of hybrid post-quantum key exchange in internet protocols

This article describes the current situation with incorporating hybrid post-quantum key exchange into the internet security protocols taking TLS 1.3 and IKEv2 as examples.

verfasst von:
Valery Smyslov

Open Access 12.02.2024 | Original Paper

Classification and online clustering of zero-day malware

A large amount of new malware is constantly being generated, which must not only be distinguished from benign samples, but also classified into malware families. For this purpose, investigating how existing malware families are developed and …

verfasst von:
Olha Jurečková, Martin Jureček, Mark Stamp, Fabio Di Troia, Róbert Lórencz

10.02.2024 | Original Paper

An approach for designing fast public key encryption systems using white-box cryptography techniques

I present an approach for designing fast public key encryption cryptosystems using random primitives, white-box cryptography techniques and obfuscated error permutation. An encryption speed of such systems allows to use them for “on-the-fly” …

verfasst von:
D. Schelkunov

07.02.2024 | Original Paper

“Dirclustering”: a semantic clustering approach to optimize website structure discovery during penetration testing

Dirbusting is a technique used to brute force directories and file names on web servers while monitoring HTTP responses in order to enumerate server contents. Such a technique uses lists of common words to discover the hidden structure of the …

verfasst von:
Diego Antonelli, Roberta Cascella, Antonio Schiano, Gaetano Perrone, Simon Pietro Romano

16.09.2023 | Original Paper

Machine learning methods for speech emotion recognition on telecommunication systems

The manuscript is devoted to the study of human behavior in stressful situations using machine learning methods, which depends on the psychotype, socialization and a host of other factors. Global mobile subscribers lost approximately $53 billion …

verfasst von:
Alexey Osipov, Ekaterina Pleshakova, Yang Liu, Sergey Gataullin

02.09.2023 | Original Paper

Machine learning methods for the industrial robotic systems security

The trends in the introduction of industrial and logistics robots into the social sphere of activity in order to ensure the safety of civilian facilities, the current problems of the growth of crime in the Russian Federation, as well as the …

verfasst von:
Dmitry Tsapin, Kirill Pitelinskiy, Stanislav Suvorov, Aleksey Osipov, Ekaterina Pleshakova, Sergey Gataullin

13.08.2023 | Original Paper

Comparison of the effectiveness of cepstral coefficients for Russian speech synthesis detection

Modern speech synthesis technologies can be used to deceive voice authentication systems, phone scams, or discredit public figures. An urgent task is to detect synthesized speech to protect against the threat of voice substitution attacks. The …

verfasst von:
Dmitry Efanov, Pavel Aleksandrov, Ilia Mironov

12.08.2023 | Correction

Correction to: Parametric study of hand dorsal vein biometric recognition vulnerability to spoofing attacks

verfasst von:
Pavel V. Mizinov, Natalia S. Konnova, Mikhail A. Basarab, Ekaterina S. Pleshakova

20.07.2023 | Original Paper

Parametric study of hand dorsal vein biometric recognition vulnerability to spoofing attacks

Biometric vein recognition systems are vulnerable to presentation attacks. Traditionally, researchers have used a near-infrared (NIR) drawing of the user’s vascular bed to create a presentation attack instrument (PAI). This paper investigates the …

verfasst von:
Pavel V. Mizinov, Natalia S. Konnova, Mikhail A. Basarab, Ekaterina S. Pleshakova

05.06.2023 | Original Paper

Potential cyber threats of adversarial attacks on autonomous driving models

Autonomous Vehicles (CAVs) are currently seen as a viable alternative to traditional vehicles. However, CAVs will face serious cyber threats because many components of the driving system are based on machine learning models and are vulnerable to …

verfasst von:
Eldar Boltachev

18.05.2023 | Original Paper

iOS mobile malware analysis: a state-of-the-art

In earlier years, most malware attacks were against Android smartphones. Unfortunately, for the past few years, the trend has shifted towards attacks against the Apple iOS smartphone. Consequently, an in-depth analysis of the malware and iOS …

verfasst von:
Madihah Mohd Saudi, Muhammad Afif Husainiamer, Azuan Ahmad, Mohd Yamani Idna Idris

04.05.2023 | Original Paper

Forecasting of digital financial crimes in Russia based on machine learning methods

In the modern world, economic relations, business, and markets are increasingly being transferred to the online world. Accordingly, the percentage of a new type of financial fraud – digital crimes – is also growing. In Russia, they are one of the …

verfasst von:
Vera Ivanyuk