Security Analysis

Enhancing Malware Detection by Integrating Machine Learning with Cuckoo Sandbox

Authors: Amaal F. Alshmarni, Mohammed A. Alliheedi | Published: 2023-11-07
Security Analysis
Dataset Generation
Deep Learning Method

Software Repositories and Machine Learning Research in Cyber Security

Authors: Mounika Vanamala, Keith Bryant, Alex Caravella | Published: 2023-11-01
Security Analysis
Software Security
Topic Modeling

Security Challenges for Cloud or Fog Computing-Based AI Applications

Authors: Amir Pakmehr, Andreas Aßmuth, Christoph P. Neumann, Gerald Pirkl | Published: 2023-10-30 | Updated: 2023-12-20
Edge Computing
Security Analysis
Data Leakage

Label Poisoning is All You Need

Authors: Rishi D. Jha, Jonathan Hayase, Sewoong Oh | Published: 2023-10-29
Security Analysis
Backdoor Attack
Classification of Malicious Actors

A Method for Network Intrusion Detection Using Flow Sequence and BERT Framework

Authors: Loc Gia Nguyen, Kohei Watabe | Published: 2023-10-26
Security Analysis
Model Design
Adversarial Attack Detection

Robust and Actively Secure Serverless Collaborative Learning

Authors: Olive Franzese, Adam Dziedzic, Christopher A. Choquette-Choo, Mark R. Thomas, Muhammad Ahmad Kaleem, Stephan Rabanser, Congyu Fang, Somesh Jha, Nicolas Papernot, Xiao Wang | Published: 2023-10-25
Security Analysis
Byzantine Resilience
Computational Efficiency

Enhancing Large Language Models for Secure Code Generation: A Dataset-driven Study on Vulnerability Mitigation

Authors: Jiexin Wang, Liuwen Cao, Xitong Luo, Zhiping Zhou, Jiayuan Xie, Adam Jatowt, Yi Cai | Published: 2023-10-25
Security Analysis
Software Security
Prompt Injection

Critical Path Prioritization Dashboard for Alert-driven Attack Graphs

Authors: Sònia Leal Díaz, Sergio Pastrana, Azqa Nadeem | Published: 2023-10-19
Security Analysis
User Experience Evaluation
Attack Graph Generation

The Efficacy of Transformer-based Adversarial Attacks in Security Domains

Authors: Kunyang Li, Kyle Domico, Jean-Charles Noirot Ferrand, Patrick McDaniel | Published: 2023-10-17
Security Analysis
Model Design
Adversarial Example

Harnessing the Power of LLM to Support Binary Taint Analysis

Authors: Puzhuo Liu, Chengnian Sun, Yaowen Zheng, Xuan Feng, Chuan Qin, Yuncheng Wang, Zhenyang Xu, Zhi Li, Peng Di, Yu Jiang, Limin Sun | Published: 2023-10-12 | Updated: 2025-01-09
Security Analysis
Prompting Strategy
Dynamic Analysis