A Linux Intrusion Investigation

A Linux Intrusion Investigation

According to the received threat intelligence report, the hacker group IronShade has launched attacks against Linux servers in the region. To prevent attacks from this APT organization and understand their attack patterns, our team set up a honeypot, exposing weak SSH and ports. As security analysts, we need to conduct a comprehensive intrusion assessment on … Read more

Analysis of a Digital Image Encryption Algorithm Based on Chaotic Mapping and Its Limitations with MATLAB Code

Analysis of a Digital Image Encryption Algorithm Based on Chaotic Mapping and Its Limitations with MATLAB Code

✅ Author Profile: A research enthusiast and Matlab simulation developer, continuously improving both mindset and technology. For code acquisition, paper reproduction, and research simulation collaboration, pleasesend a private message. 🍎 Personal Homepage: Matlab King Assistant 🍊 Personal Motto: Walk every day, fear not the distance of ten thousand miles 🍊 Code Acquisition Method: QQ: 2307468664 … Read more

IOTFUZZER: Discovering Memory Corruption in IoT Through Application-Based Fuzz Testing

IOTFUZZER: Discovering Memory Corruption in IoT Through Application-Based Fuzz Testing

1. Overview The author proposes a novel automated black-box Fuzz testing framework—IOTFUZZER, aimed at monitoring memory corruption vulnerabilities in IoT devices. Main Advantages No need to obtain firmware images of IoT devices. No reverse engineering required. No need to know the specifics of the protocol. Purpose of Work Only Fuzz testing, used to guide subsequent … Read more

Analysis of Risks and Security Assurance in Real-Time Embedded Systems

Analysis of Risks and Security Assurance in Real-Time Embedded Systems

Since the second issue of 2020, the “Foreword” column has been launched in the journal “Microcontrollers and Embedded System Applications”, inviting an industry expert each issue to share their views on embedded technology related to current hot topics, benefiting embedded technology practitioners and enthusiasts. The article published today is the foreword for the 12th issue … Read more