ESAFE: Enterprise Security and Forensics at Scale

Authors: Bernard McShea, Kevin Wright, Denley Lam, Steve Schmidt, Anna Choromanska, Devansh Bisla, Shihong Fang, Alireza Sarmadi, Prashanth Krishnamurthy, Farshad Khorrami | Published: 2021-12-08

Membership Inference Attacks From First Principles

Authors: Nicholas Carlini, Steve Chien, Milad Nasr, Shuang Song, Andreas Terzis, Florian Tramer | Published: 2021-12-07 | Updated: 2022-04-12

Control Parameters Considered Harmful: Detecting Range Specification Bugs in Drone Configuration Modules via Learning-Guided Search

Authors: Ruidong Han, Chao Yang, Siqi Ma, JiangFeng Ma, Cong Sun, Juanru Li, Elisa Bertino | Published: 2021-12-07

Adversarial Machine Learning In Network Intrusion Detection Domain: A Systematic Review

Authors: Huda Ali Alatwi, Charles Morisset | Published: 2021-12-06

Does Proprietary Software Still Offer Protection of Intellectual Property in the Age of Machine Learning? — A Case Study using Dual Energy CT Data

Authors: Andreas Maier, Seung Hee Yang, Farhad Maleki, Nikesh Muthukrishnan, Reza Forghani | Published: 2021-12-06

When the Curious Abandon Honesty: Federated Learning Is Not Private

Authors: Franziska Boenisch, Adam Dziedzic, Roei Schuster, Ali Shahin Shamsabadi, Ilia Shumailov, Nicolas Papernot | Published: 2021-12-06 | Updated: 2023-04-12

Beyond Robustness: Resilience Verification of Tree-Based Classifiers

Authors: Stefano Calzavara, Lorenzo Cazzaro, Claudio Lucchese, Federico Marcuzzi, Salvatore Orlando | Published: 2021-12-05

Using Static and Dynamic Malware features to perform Malware Ascription

Authors: Jashanpreet Singh Sraw, Keshav Kumar | Published: 2021-12-05

SHAPr: An Efficient and Versatile Membership Privacy Risk Metric for Machine Learning

Authors: Vasisht Duddu, Sebastian Szyller, N. Asokan | Published: 2021-12-04 | Updated: 2022-09-05

PhishMatch: A Layered Approach for Effective Detection of Phishing URLs

Authors: Harshal Tupsamudre, Sparsh Jain, Sachin Lodha | Published: 2021-12-04