37 research outputs found
Protecting Software through Obfuscation:Can It Keep Pace with Progress in Code Analysis?
Software obfuscation has always been a controversially discussed research area. While theoretical results indicate that provably secure obfuscation in general is impossible, its widespread application in malware and commercial software shows that it is nevertheless popular in practice. Still, it remains largely unexplored to what extent today’s software obfuscations keep up with state-of-the-art code analysis and where we stand in the arms race between software developers and code analysts. The main goal of this survey is to analyze the effectiveness of different classes of software obfuscation against the continuously improving deobfuscation techniques and off-the-shelf code analysis tools.
The answer very much depends on the goals of the analyst and the available resources. On the one hand, many forms of lightweight static analysis have difficulties with even basic obfuscation schemes, which explains the unbroken popularity of obfuscation among malware writers. On the other hand, more expensive analysis techniques, in particular when used interactively by a human analyst, can easily defeat many obfuscations. As a result, software obfuscation for the purpose of intellectual property protection remains highly challenging.</jats:p
An Extended View on Measuring Tor AS-level Adversaries
Tor provides anonymity to millions of users around the globe which has made
it a valuable target for malicious actors. As a low-latency anonymity system,
it is vulnerable to traffic correlation attacks from strong passive adversaries
such as large autonomous systems (ASes). In preliminary work, we have developed
a measurement approach utilizing the RIPE Atlas framework -- a network of more
than 11,000 probes worldwide -- to infer the risk of deanonymization for IPv4
clients in Germany and the US.
In this paper, we apply our methodology to additional scenarios providing a
broader picture of the potential for deanonymization in the Tor network. In
particular, we (a) repeat our earlier (2020) measurements in 2022 to observe
changes over time, (b) adopt our approach for IPv6 to analyze the risk of
deanonymization when using this next-generation Internet protocol, and (c)
investigate the current situation in Russia, where censorship has been
intensified after the beginning of Russia's full-scale invasion of Ukraine.
According to our results, Tor provides user anonymity at consistent quality:
While individual numbers vary in dependence of client and destination, we were
able to identify ASes with the potential to conduct deanonymization attacks.
For clients in Germany and the US, the overall picture, however, has not
changed since 2020. In addition, the protocols (IPv4 vs. IPv6) do not
significantly impact the risk of deanonymization. Russian users are able to
securely evade censorship using Tor. Their general risk of deanonymization is,
in fact, lower than in the other investigated countries. Beyond, the few ASes
with the potential to successfully perform deanonymization are operated by
Western companies, further reducing the risk for Russian users
Enter Sandbox: Android Sandbox Comparison
Expecting the shipment of 1 billion Android devices in 2017, cyber criminals
have naturally extended their vicious activities towards Google's mobile
operating system. With an estimated number of 700 new Android applications
released every day, keeping control over malware is an increasingly challenging
task. In recent years, a vast number of static and dynamic code analysis
platforms for analyzing Android applications and making decision regarding
their maliciousness have been introduced in academia and in the commercial
world. These platforms differ heavily in terms of feature support and
application properties being analyzed. In this paper, we give an overview of
the state-of-the-art dynamic code analysis platforms for Android and evaluate
their effectiveness with samples from known malware corpora as well as known
Android bugs like Master Key. Our results indicate a low level of diversity in
analysis platforms resulting from code reuse that leaves the evaluated systems
vulnerable to evasion. Furthermore the Master Key bugs could be exploited by
malware to hide malicious behavior from the sandboxes.Comment: In Proceedings of the Third Workshop on Mobile Security Technologies
(MoST) 2014 (http://arxiv.org/abs/1410.6674
Beyond the Front Page: Measuring Third Party Dynamics in the Field
In the modern Web, service providers often rely heavily on third parties to
run their services. For example, they make use of ad networks to finance their
services, externally hosted libraries to develop features quickly, and
analytics providers to gain insights into visitor behavior.
For security and privacy, website owners need to be aware of the content they
provide their users. However, in reality, they often do not know which third
parties are embedded, for example, when these third parties request additional
content as it is common in real-time ad auctions.
In this paper, we present a large-scale measurement study to analyze the
magnitude of these new challenges. To better reflect the connectedness of third
parties, we measured their relations in a model we call third party trees,
which reflects an approximation of the loading dependencies of all third
parties embedded into a given website. Using this concept, we show that
including a single third party can lead to subsequent requests from up to eight
additional services. Furthermore, our findings indicate that the third parties
embedded on a page load are not always deterministic, as 50% of the branches in
the third party trees change between repeated visits. In addition, we found
that 93% of the analyzed websites embedded third parties that are located in
regions that might not be in line with the current legal framework. Our study
also replicates previous work that mostly focused on landing pages of websites.
We show that this method is only able to measure a lower bound as subsites show
a significant increase of privacy-invasive techniques. For example, our results
show an increase of used cookies by about 36% when crawling websites more
deeply
Promotion of online sales for company moduli sg d. o. o. on sewing and tailoring programs
V diplomskem projektu obravnavam pospeševanje spletne prodaje v izbranem podjetju. V prvem delu diplomskega projekta sem opredelila teoretična izhodišča o orodjih marketinškega komuniciranja in se še posebej osredotočila na opredelitev, razlago ciljev, prednosti in slabosti ter tveganja pospeševanja prodaje. Predstavila sem tudi promocijska orodja spletne prodaje in njene ključne elemente ter orodja. V nadaljevanju sledi tudi predstavitev podjetja. V raziskovalnem delu pa s pomočjo anketnega vprašalnika in izvajanja nagradne igre povzamem ugotovitve in podam sklep na zastavljene hipoteze.In my diploma work, I am dealing with online sales promotion in a selected company. In the first part of my diploma work, I define the theoretical background of marketing communication tools, focusing in particular on the definition, explanation of the objectives, advantages and disadvantages and risks of sales promotion. In this part, I also present the promotional tools of online sales and its key elements and tools. A presentation of the company follows. In the research part, I summarise the findings and draw conclusions on the hypotheses by means of a questionnaire and a prize game
Projekt organizacije gradbišča "Stanovanjski blok Meža" : diplomska naloga visokošolskega študijskega programa
Security and privacy in mobile environments
The number of smartphones is constantly increasing and they have become a central part of our lives. A big role for their success is the large number of available applications. While these applications open up a lot of opportunities for their users, they can also pose risks. With the amount of available applications, it is inevitable that they also include bad quality software. While these applications may not pose a direct risk to the device itself, many of them are communicating to some kind of back-end server on the internet. Furthermore, "free" applications often include some kind of advertisement, which needs to be loaded from a server again. We analyze the existing ecosystem of third party tracking in web and mobile applications and evaluate defenses according to their effectiveness in blocking tracking efforts. We show that there is still a lot of information transmitted in clear text, without the use of Transport Layer Security. In addition, even when TLS is used, this tracking information can still be used by attackers for certain kind of attacks. Based on our findings, we propose different approaches to protect user privacy and security. Specifically, we explore notary-based validation schemes for certificate validation and provide a longitudinal study of certificate validation capabilities of available notary services. Mobile apps already employ certificate pinning to prevent interception attacks. However, the application still needs to be updated when the corresponding certificate changes. We therefore provide an on-device certificate pinning solution, which utilizes notary services to update pinned certificates automatically and transparently for the user. Finally, we evaluate existing Android malware analysis platforms and provide metrics on the effectiveness and inter-dependencies of these services. This allows security analysts to select the best fitting system or subset of systems to accomplish their analysis task.14
Burnout of special needs and rehabilitation pedagogues in Koroška regoin and in Velenje
Everyone, at some point in their lives, faces with stress. Some individuals recognize it quickly enough, so they are able to make use of strategies to avoid suffering from the burnout syndrome, while others overlook early stress symptoms and do not notice what is happening with them until it is too late. They need help in overcoming the burnout in order to begin to live their lives again.
In the beginning of the thesis the work of a special and rehabilitation pedagogue is presented, the main focus is, however, on a burnout in general and at a work place, its symptoms and causes among individuals and teachers, specifically special and rehabilitation pedagogues. Some Slovenian and foreign researches on the topic have also been presented, as well as suggestions for preventing and treating the burnout syndromes which could be used by any individual.
The main purpose of my work was to identify the rate of the burnout syndrome among special and rehabilitation pedagogues in Slovene Carinthia and City Municipality of Velenje. The analysis results indicate that less than half of the participants show symptoms of a burnout. Despite the low participation rate, the results imply that the special pedagogues in this region of Slovenia tend to not be burnt out
