Skip to main content
King Abdullah University of Science and Technology
Computer, Electrical and Mathematical Sciences and Engineering
CEMSE
Computer, Electrical and Mathematical Sciences and Engineering
  • Home
  • Study
    • Prospective Students
    • Current Students
    • Internship Opportunities
  • Research
    • Research Overview
    • Research Areas
    • Research Groups
  • Programs
    • Applied Mathematics and Computational Sciences
    • Computer Science
    • Electrical and Computer Engineering
    • Statistics
  • People
    • All People
    • Faculty
    • Affiliate Faculty
    • Instructional Faculty
    • Research Scientists
    • Research Staff
    • Postdoctoral Fellows
    • Students
    • Alumni
    • Administrative Staff
  • News
  • Events
  • About
    • Who We Are
    • Message from the Dean
    • Leadership Team
  • Apply

malware

BGP hijacks: the next generation stealthy Command and Control for botnets

Dr. Marc Dacier, Chair of the Digital Security department and a full Professor at Eurecom, France

Sep 30, 12:00 - 13:00

B9 L2 H1 R2322

botnets C2C malware command and control

Abstract It is well known that malware spreading over the Internet aim at transforming vulnerable devices into bots that can be misused by attackers. These armies of bots constitute what is commonly called "botnets" and they are given tasks (such as spamming, dosing, etc..) to do through a "command and control" infrastructure (C2C). Identifying and neutralizing these C2C has been the subject of an arms race between white and black hats for years. In this talk, we will briefly explain how C2C works and how they have been (and still are being) detected. We will then present some very strange

Securing 5G and Beyond Networks from Malware Epidemics: A Percolation Theoretic Approach

Hesham Elsawy, Assistant Professor, Electrical and Computer Engineering KFUPM, Dhahran

Nov 28, 13:00 - 14:00

B1 L3 R3119

5G networks malware

This talk will introduce and motivate a percolation theoretic approach to characterize and thwart malware diffusion in dense wireless networks. First, a brief tutorial on percolation theory will be introduced. Then, the talk will explain the utilization of percolation theory to develop security countermeasures for malware epidemics in 5G and beyond networks.

Computer, Electrical and Mathematical Sciences and Engineering (CEMSE)

Connect with us

Footer

  • A-Z Directory
    • All Content
    • Announcements
    • Browse Related Sites
  • Site Management
    • Log in

© 2024 King Abdullah University of Science and Technology. All rights reserved. Privacy Notice