Category: Cyber
Home Research
Syahril Handaya, Raihan Islamadina
IMLEMENTASI PENETRATION TESTING PADA APLIKASI WEB SISTEM EVALUASI DATA BIDANG TIK POLDA ACEH MENGGUNAKAN METODE OWASP DAN NIST SP 800-115
Cyber

AbstrakKeamanan sistem informasi merupakan aspek yang perlu diperhatikan. Keamanan informasi terdiri dari 3 aspek yaitu Kerahasiaan, Integr...

View Full Research
Kudzaishe Lawal Chizengwe, Belinda Ndlovu
A Systematic Review of Agentic AI for Threat Detection and Mitigation in 5G Networks
Cyber

Fifth-generation (5G) networks face escalating security challenges driven by decentralised architectures, stringent ultra-low-latency requi...

View Full Research
Mochamad Sanwasih, Fajar Septian, Ristasari Dwi Septiana
Deteksi Intrusi Jaringan Berbasis Machine Learning Menggunakan Model Boosting dengan Session-Level Feature Representation
Cyber

The increasing complexity of network security threats demands intrusion detection systems that are both contextual and adaptive. Conventional signatur...

Review:

This study tackles the increasingly complex challenge of network security by proposing an enhanced machine learning-based intrusion detection system (...

View Full Research
Agustyarum Pradiska Budi, Sri Wulandari, Galuh Nugrahaning Budi
ANALISIS MODEL HOT-FIT TERHADAP KINERJA KEAMANAN SIBER DENGAN MEDIASI KESIAPAN KEAMANAN SIBER DI RSUD AJIBARANG
Cyber

Penelitian ini bertujuan mengkaji faktor-faktor HOT-FIT yaitu Human, Organization dan Technology untuk mengukur kinerja keamanan siber yang...

Review:

This study, titled "ANALISIS MODEL HOT-FIT TERHADAP KINERJA KEAMANAN SIBER DENGAN MEDIASI KESIAPAN KEAMANAN SIBER DI RSUD AJIBARANG," addresses a crit...

View Full Research
Salza Aulia Fitri, Muhammad Ramadhan, Raffi Ciputra, Ernis Sita Eriana, M.Irham
Detecting Cyber Crime for Forensic Computer Handling using OSINT
Cyber

In handling computer forensics with backward chaining, the cybercrime detection expert system serves to detect cybercrime crimes committed by crim...

Review:

This paper proposes an expert system utilizing backward chaining to assist in cybercrime detection within computer forensics, aiming to identify speci...

View Full Research
Jonas Juffinger
An Analysis of HMB-based SSD Rowhammer
Cyber

Rowhammer has been shown to be an extensive attack vector. In the years since its discovery, numerous exploits have been shown, attacking...

Review:

This paper investigates a novel and increasingly relevant attack surface for Rowhammer: Solid State Drives (SSDs), specifically those leveraging the H...

View Full Research
Ruben Mechelinck, Daniel Dorfmeister, Bernhard Fischer, Stefan Brunthaler, Stijn Volckaert
Talk: GlueZilla: Efficient and Scalable Software to Hardware Binding using Rowhammer
Cyber

Industrial-scale reverse engineering affects the majority of companies in the mechanical and plant engineering sector and imposes significa...

Review:

This talk introduces GlueZilla, a novel system designed to combat industrial-scale reverse engineering, particularly focusing on the replication of ha...

View Full Research
Tomer Laor, Yossi Oren
Poster: LockedApart: Faster GPU Fingerprinting Through the Compute API
Cyber

WebGL offers website direct access to the GPU, allowing beautiful graphics. The direct hardware access offered by WebGL was also shown to...

Review:

This submission presents a timely and relevant investigation into the security implications of the newly introduced WebGPU API, specifically concernin...

View Full Research
Martin Heckel, Florian Adamsky
Flipper: Rowhammer on Steroids
Cyber

The density of memory cells in modern DRAM is so high that frequently accessing a memory row can flip bits in nearby rows. That effect is c...

Review:

This paper, titled "Flipper: Rowhammer on Steroids," presents a compelling advancement in Rowhammer research by introducing Flipper, an amplification...

View Full Research
Tristan Hornetz, Michael Schwarz
PortPrint: Identifying Inaccessible Code with Port Contention
Cyber

In many real-world scenarios, being able to infer specific software versions or variations of cryptographic libraries is critical to mounti...

Review:

This paper, titled "PortPrint: Identifying Inaccessible Code with Port Contention," addresses a critical challenge in security research: inferring spe...

View Full Research

    Showing 1 to 10 of 23 results