scispace - formally typeset
S

Salman Niksefat

Researcher at Amirkabir University of Technology

Publications -  16
Citations -  353

Salman Niksefat is an academic researcher from Amirkabir University of Technology. The author has contributed to research in topics: Intrusion detection system & Binary decision diagram. The author has an hindex of 9, co-authored 14 publications receiving 233 citations.

Papers
More filters
Journal ArticleDOI

Malware Dynamic Analysis Evasion Techniques: A Survey

TL;DR: It is proposed that the current defensive strategies, beginning with reactive methods to endeavors for more transparent analysis systems, are readily foiled by zero-day fingerprinting techniques or other evasion tactics such as stalling, and would recommend the pursuit of more generic defensive strategies with an emphasis on path exploration techniques that has the potential to thwart all the evasive tactics.
Book ChapterDOI

An efficient protocol for oblivious DFA evaluation and applications

TL;DR: An efficient protocol for oblivious DFA evaluation between an input holder (client) and a DFA holder (server) and the most efficient version of this protocol only requires O(k) asymmetric operations by either party, where k is the security parameter.
Proceedings ArticleDOI

An Efficient Scheme to Motivate Cooperation in Mobile Ad hoc Networks

TL;DR: A distributed scheme to counter with selfish nodes and to enforce cooperation in pure mobile ad hoc networks is proposed, a combination of reputation based and currency based schemes which mitigates defects and improves advantages of them.
Posted Content

Malware Dynamic Analysis Evasion Techniques: A Survey.

TL;DR: It is proposed that the current defensive strategies beginning with reactive methods to endeavors for more transparent analysis systems are readily foiled by zero-day fingerprinting techniques or other evasion tactics such as stalling, and would recommend pursuit of more generic defensive strategies with emphasis on path exploration techniques that have the potential to thwart all the evasive tactics.
Journal ArticleDOI

Pure-Call Oriented Programming (PCOP): chaining the gadgets using call instructions

TL;DR: This work is the first that shows real code-reuse attacks solely based on call gadgets, and shows that the proposed PCOP is Turing-complete, meaning that any functionality can be driven by PCOP.