artefacts
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
artefacts [2021/11/02 18:35] – [Software developed by SEC] zannonen | artefacts [2023/10/13 12:31] (current) – mcampobasso | ||
---|---|---|---|
Line 4: | Line 4: | ||
^ Sw artefact | ^ Sw artefact | ||
+ | | THREAT/ | ||
| SAFAX | SAFAX is an extensible authorization framework offered as a service. SAFAX provides a novel XACML-based architectural framework tailored to the development of extensible authorization services for clouds. The key design principle underlying SAFAX is that all components are loosely coupled services, thus providing the flexibility, | | SAFAX | SAFAX is an extensible authorization framework offered as a service. SAFAX provides a novel XACML-based architectural framework tailored to the development of extensible authorization services for clouds. The key design principle underlying SAFAX is that all components are loosely coupled services, thus providing the flexibility, | ||
|TRIPLEX|TRIPLEX is a tool-supported framework for the analysis of data minimisation in privacy-enhancing protocols. TRIPLEX allows users to visually construct scenarios of different actors communicating using any kind of privacy-enhancing protocol. TRIPLEX automatically simulates these scenarios, and provides different analysis tools. The tools, geared towards non-cryptography-experts, | |TRIPLEX|TRIPLEX is a tool-supported framework for the analysis of data minimisation in privacy-enhancing protocols. TRIPLEX allows users to visually construct scenarios of different actors communicating using any kind of privacy-enhancing protocol. TRIPLEX automatically simulates these scenarios, and provides different analysis tools. The tools, geared towards non-cryptography-experts, | ||
Line 9: | Line 10: | ||
|DALTIA|DALTIA is a tool for DAta Leakage deTection analysIs and visuAlization. DALTIA tackles the data leakage problem from different perspectives, | |DALTIA|DALTIA is a tool for DAta Leakage deTection analysIs and visuAlization. DALTIA tackles the data leakage problem from different perspectives, | ||
|APD| The Anomalous Pattern Discovery Tool (APD) is a tool aimed at providing the user with a set of advanced functionalities to infer and explore deviations occurred in a set of past process executions. | | | |APD| The Anomalous Pattern Discovery Tool (APD) is a tool aimed at providing the user with a set of advanced functionalities to infer and explore deviations occurred in a set of past process executions. | | | ||
+ | |A Toolkit for Tailored Phishing| The toolkit allows the deployment of sophisticated, | ||
Line 20: | Line 22: | ||
^ Data ^ Description | ^ Data ^ Description | ||
- | | IMPAAS_DATASETS| Information about the advertised products, namely user profiles, crawled from the listing of an underground market providing Impersonation-as-a-Service products. Two datasets are available; the former contains general information about all products available at scraping time, the latter details a random subset of profiles with information such as which credentials have been stolen from. In addition, a file R with the statistical analysis used for the paper can be available. | [[https:// | + | | INDICTED_CYBERCRIMINALS | List of indicted, convicted and arrested cybercriminals spanning from 2011 to 2021, extracted from https:// |
+ | | IMPAAS_ECONOMY_DATASETS | Information about the advertised products, namely user profiles, crawled from the listing of an underground market providing Impersonation-as-a-Service products. Two datasets are available: (1) contains detailed information about the 25% random sample of daily advertised profiles on the market, collected on a daily basis; (2) is a collection of short information regarding the profiles scraped during each daily capture contained in (1), collected over the following 6 days to infer which profiles have been sold over time. In addition, we provide the scripts used to perform the pre-processing of the data. Finally, we provide the crawling infrastructure adopted to scrape the data from the market. | [[https:// | ||
+ | | IMPAAS_DATASETS| Information about the advertised products, namely user profiles, crawled from the listing of an underground market providing Impersonation-as-a-Service products. Two datasets are available; the former contains general information about all products available at scraping time, the latter details a random subset of profiles with information such as which credentials have been stolen from. In addition, a file R with the statistical analysis used for the paper can be available. | [[https:// | ||
| MALMARKET_VULNS | CVEs published in a prominent Russian cybercrime market (as of April 2017). Reports CVE identifiers, | | MALMARKET_VULNS | CVEs published in a prominent Russian cybercrime market (as of April 2017). Reports CVE identifiers, | ||
| MALMARKET | Unstructured dataset with the dumps of the market forum interactions (in Russian) spawning from the CVE trading reported in MALMARKET_VULNS.| [[https:// | | MALMARKET | Unstructured dataset with the dumps of the market forum interactions (in Russian) spawning from the CVE trading reported in MALMARKET_VULNS.| [[https:// |
artefacts.1635874523.txt.gz · Last modified: 2021/11/02 18:35 by zannonen