S
Salman Niksefat
Researcher at Amirkabir University of Technology
Publications - 16
Citations - 353
Salman Niksefat is an academic researcher from Amirkabir University of Technology. The author has contributed to research in topics: Intrusion detection system & Binary decision diagram. The author has an hindex of 9, co-authored 14 publications receiving 233 citations.
Papers
More filters
Journal ArticleDOI
Malware Dynamic Analysis Evasion Techniques: A Survey
TL;DR: It is proposed that the current defensive strategies, beginning with reactive methods to endeavors for more transparent analysis systems, are readily foiled by zero-day fingerprinting techniques or other evasion tactics such as stalling, and would recommend the pursuit of more generic defensive strategies with an emphasis on path exploration techniques that has the potential to thwart all the evasive tactics.
Book ChapterDOI
An efficient protocol for oblivious DFA evaluation and applications
TL;DR: An efficient protocol for oblivious DFA evaluation between an input holder (client) and a DFA holder (server) and the most efficient version of this protocol only requires O(k) asymmetric operations by either party, where k is the security parameter.
Proceedings ArticleDOI
An Efficient Scheme to Motivate Cooperation in Mobile Ad hoc Networks
TL;DR: A distributed scheme to counter with selfish nodes and to enforce cooperation in pure mobile ad hoc networks is proposed, a combination of reputation based and currency based schemes which mitigates defects and improves advantages of them.
Posted Content
Malware Dynamic Analysis Evasion Techniques: A Survey.
TL;DR: It is proposed that the current defensive strategies beginning with reactive methods to endeavors for more transparent analysis systems are readily foiled by zero-day fingerprinting techniques or other evasion tactics such as stalling, and would recommend pursuit of more generic defensive strategies with emphasis on path exploration techniques that have the potential to thwart all the evasive tactics.
Journal ArticleDOI
Pure-Call Oriented Programming (PCOP): chaining the gadgets using call instructions
TL;DR: This work is the first that shows real code-reuse attacks solely based on call gadgets, and shows that the proposed PCOP is Turing-complete, meaning that any functionality can be driven by PCOP.