Skip to main content
King Abdullah University of Science and Technology
King Abdullah University of Science and Technology
KAUST
Main navigation
  • Home

malware

BGP hijacks: the next generation stealthy Command and Control for botnets

Dr. Marc Dacier, Chair of the Digital Security department and a full Professor at Eurecom, France

Sep 30, 12:00 - 13:00

B9 L2 H1 R2322

botnets C2C malware command and control

Abstract It is well known that malware spreading over the Internet aim at transforming vulnerable devices into bots that can be misused by attackers. These armies of bots constitute what is commonly called "botnets" and they are given tasks (such as spamming, dosing, etc..) to do through a "command and control" infrastructure (C2C). Identifying and neutralizing these C2C has been the subject of an arms race between white and black hats for years. In this talk, we will briefly explain how C2C works and how they have been (and still are being) detected. We will then present some very strange

Securing 5G and Beyond Networks from Malware Epidemics: A Percolation Theoretic Approach

Hesham Elsawy, Assistant Professor, Electrical and Computer Engineering KFUPM, Dhahran

Nov 28, 13:00 - 14:00

B1 L3 R3119

5G networks malware

This talk will introduce and motivate a percolation theoretic approach to characterize and thwart malware diffusion in dense wireless networks. First, a brief tutorial on percolation theory will be introduced. Then, the talk will explain the utilization of percolation theory to develop security countermeasures for malware epidemics in 5G and beyond networks.

Footer

  • A-Z Directory
    • All Content
    • Browse Related Sites
  • Site Management
    • Log in

© 2024 King Abdullah University of Science and Technology. All rights reserved. Privacy Notice