Machine Learning vs Machine Learning in Malware Evasion (available)

Machine learning is a popular approach to signature-less malware detection because it can generalize to new (unseen) malware families. Some recent works have proposed the use of AI/ML-powered malware to bypass machine learning anti-malware systems. The goal of the project is to model the system of malware vs anti-malware systems as two opponents using various … full description “Machine Learning vs Machine Learning in Malware Evasion (available)”

Mitigating Anti-Sandboxing Tricks used by Malware (available)

Aims: Detecting and Mitigating some Evasion Techniques used by Malware Background: Several malware samples exploit advanced tactics to detect whether they are run in a sandboxed/virtual analysis environment. In such cases, malware samples do not perform any malicious actions to evade analysis and detection by security researchers. The goal of the project is to analyse … full description “Mitigating Anti-Sandboxing Tricks used by Malware (available)”

OSN Mining Platform – Building a public dataset for fake news research (available)

Project Description According to the Statista, in 2018 the UK had 44 million (66% of the population) active Online Social Networks (OSN) users. Whereas, globally, active OSN user population is 3,397 million. The most popular reason for using the OSN is to stay in touch with friends and family (42% of respondents) and stay up … full description “OSN Mining Platform – Building a public dataset for fake news research (available)”

Security Behaviours and Risk Quantification (available)

Project background Cybersecurity is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. Apart from improving the infrastructure and hardware through better technology, one of the most important security aspects is the risk assessment of potential breaches, in an ever increasingly complex threat landscape. Most current risk assessment … full description “Security Behaviours and Risk Quantification (available)”

WebAssembly-based microarchitectural covert channel attacks: capabilities, proof-of-concept, and implications (available)

WebAssembly-based microarchitectural covert channel attacks: capabilities, proof-of-concept, and implications   Microarchitectural covert channels are a threat to data confidentiality in multi-tenant environments (cloud platform, mobile phone, etc.). This type of leakage channel aims at tunnelling information across isolation boundaries (sandboxing, censorship, etc.) by exploiting timing variations during program execution. Indeed, the state of microarchitectural components … full description “WebAssembly-based microarchitectural covert channel attacks: capabilities, proof-of-concept, and implications (available)”