Security Assurance

Targets in Reinforcement Learning to solve Stackelberg Security Games

Authors: Saptarashmi Bandyopadhyay, Chenqi Zhu, Philip Daniel, Joshua Morrison, Ethan Shay, John Dickerson | Published: 2022-11-30
Algorithm Design
Stacking Model
Security Assurance

BLADERUNNER: Rapid Countermeasure for Synthetic (AI-Generated) StyleGAN Faces

Authors: Adam Dorian Wong | Published: 2022-10-12 | Updated: 2022-10-28
DNN IP Protection Method
Security Assurance
Challenges of Generative Models

A Certifiable Security Patch for Object Tracking in Self-Driving Systems via Historical Deviation Modeling

Authors: Xudong Pan, Qifan Xiao, Mi Zhang, Min Yang | Published: 2022-07-18
Algorithm Design
Security Assurance
State Estimation Method

DarKnight: An Accelerated Framework for Privacy and Integrity Preserving Deep Learning Using Trusted Hardware

Authors: Hanieh Hashemi, Yongqin Wang, Murali Annavaram | Published: 2022-06-30
DNN IP Protection Method
Security Assurance
Privacy Risk Management

A New Security Boundary of Component Differentially Challenged XOR PUFs Against Machine Learning Modeling Attacks

Authors: Gaoxiang Li, Khalid T. Mursi, Ahmad O. Aseeri, Mohammed S. Alkatheiri, Yu Zhuang | Published: 2022-06-02
Evaluation Methods for PUF
Security Assurance
Training Protocol

R-HTDetector: Robust Hardware-Trojan Detection Based on Adversarial Training

Authors: Kento Hasegawa, Seira Hidano, Kohei Nozawa, Shinsaku Kiyomoto, Nozomu Togawa | Published: 2022-05-27
Security Assurance
Trojan Detection
Feature Extraction Method

Spoofing Generalization: When Can’t You Trust Proprietary Models?

Authors: Ankur Moitra, Elchanan Mossel, Colin Sandon | Published: 2021-06-15 | Updated: 2022-03-23
Security Assurance
Signature Scheme Attack
Computational Complexity

Towards Memory Safe Python Enclave for Security Sensitive Computation

Authors: Huibo Wang, Mingshen Sun, Qian Feng, Pei Wang, Tongxin Li, Yu Ding | Published: 2020-05-12
Security Assurance
Privacy Assessment
Vulnerability Assessment Method

Digit Recognition From Wrist Movements and Security Concerns with Smart Wrist Wearable IOT Devices

Authors: Lambert T. Leong, Sean Wiere | Published: 2020-04-22
Security Assurance
Role of Machine Learning
Feature Engineering

Scalable and Secure Architecture for Distributed IoT Systems

Authors: Najmeddine Dhieb, Hakim Ghazzai, Hichem Besbes, Yehia Massoud | Published: 2020-04-20
Security Assurance
Malware Classification
Role of Machine Learning