Attack detection based on machine learning algorithms for different variants of Spectre attacks and different Meltdown attack implementations

Authors: Zhongkai Tong, Ziyuan Zhu, Yusha Zhang, Yuxin Liu, Dan Meng | Published: 2022-08-30

Reducing Certified Regression to Certified Classification for General Poisoning Attacks

Authors: Zayd Hammoudeh, Daniel Lowd | Published: 2022-08-29 | Updated: 2022-12-29

Reinforcement Learning for Hardware Security: Opportunities, Developments, and Challenges

Authors: Satwik Patnaik, Vasudev Gohil, Hao Guo, Jeyavijayan, Rajendran | Published: 2022-08-29

Towards Adversarial Purification using Denoising AutoEncoders

Authors: Dvij Kalaria, Aritra Hazra, Partha Pratim Chakrabarti | Published: 2022-08-29

Understanding the Limits of Poisoning Attacks in Episodic Reinforcement Learning

Authors: Anshuka Rangi, Haifeng Xu, Long Tran-Thanh, Massimo Franceschetti | Published: 2022-08-29

Lateral Movement Detection Using User Behavioral Analysis

Authors: Deepak Kushwaha, Dhruv Nandakumar, Akshay Kakkar, Sanvi Gupta, Kevin Choi, Christopher Redino, Abdul Rahman, Sabthagiri Saravanan Chandramohan, Edward Bowen, Matthew Weeks, Aaron Shaha, Joe Nehila | Published: 2022-08-29

Overparameterization from Computational Constraints

Authors: Sanjam Garg, Somesh Jha, Saeed Mahloujifar, Mohammad Mahmoody, Mingyuan Wang | Published: 2022-08-27 | Updated: 2022-10-15

Federated and Privacy-Preserving Learning of Accounting Data in Financial Statement Audits

Authors: Marco Schreyer, Timur Sattarov, Damian Borth | Published: 2022-08-26

I still know it’s you! On Challenges in Anonymizing Source Code

Authors: Micha Horlboge, Erwin Quiring, Roland Meyer, Konrad Rieck | Published: 2022-08-26 | Updated: 2024-04-10

Unraveling Threat Intelligence Through the Lens of Malicious URL Campaigns

Authors: Mahathir Almashor, Ejaz Ahmed, Benjamin Pick, Sharif Abuadbba, Jason Xue, Raj Gaire, Shuo Wang, Seyit Camtepe, Surya Nepal | Published: 2022-08-26