Skip to main content

Research Repository

Advanced Search

All Outputs (4)

Investigating anti-evasion malware triggers using automated sandbox reconfiguration techniques (2020)
Journal Article
Mills, A., & Legg, P. (2021). Investigating anti-evasion malware triggers using automated sandbox reconfiguration techniques. Journal of Cybersecurity and Privacy, 1(1), 19-39. https://doi.org/10.3390/jcp1010003

Malware analysis is fundamental for defending against prevalent cyber security threats and requires a means to deploy and study behavioural software traits as more sophisticated malware is developed. Traditionally, virtual machines are used to provid... Read More about Investigating anti-evasion malware triggers using automated sandbox reconfiguration techniques.

The visual design of network data to enhance cyber security awareness of the everyday internet user (2020)
Presentation / Conference
Carroll, F., Legg, P., & Bønkel, B. (2020, June). The visual design of network data to enhance cyber security awareness of the everyday internet user. Paper presented at IEEE International Conference on Cyber Situational Awareness, Data Analytics and Assessment (Cyber Science 2020)

Technology and the use of online services are very prevalent across much of our everyday lives. As our digital interactions continue to grow, there is a need to improve public awareness of the risks to our personal online privacy and security. Design... Read More about The visual design of network data to enhance cyber security awareness of the everyday internet user.

Shouting through letterboxes: A study on attack susceptibility of voice assistants (2020)
Presentation / Conference
Mccarthy, A., Gaster, B., & Legg, P. (2020, June). Shouting through letterboxes: A study on attack susceptibility of voice assistants. Paper presented at IEEE International Conference on Cyber Security and the Protection of Digital Services (Cyber Science 2020)

Voice assistants such as Amazon Echo and Google Home have become increasingly popular for many home users, for home automation, entertainment, and convenience. These devices process speech commands from a user to execute some action, such as playing... Read More about Shouting through letterboxes: A study on attack susceptibility of voice assistants.

"What did you say?": Extracting unintentional secrets from predictive text learning systems (2020)
Presentation / Conference
Wilkinson, G., & Legg, P. (2020, June). "What did you say?": Extracting unintentional secrets from predictive text learning systems. Paper presented at IEEE International Conference on Cyber Security and Protection of Digital Services (Cyber Science 2020)

As a primary form of communication, text is used widely in applications including e-mail conversations, mobile text messaging, chatrooms, and forum discussions. Modern systems include facilities such as predictive text, recently implemented using dee... Read More about "What did you say?": Extracting unintentional secrets from predictive text learning systems.