Attack Method

Analysis, Detection, and Classification of Android Malware using System Calls

Authors: Shubham Shakya, Mayank Dave | Published: 2022-08-12
Malware Classification
Malware Detection Method
Attack Method

Shielding Federated Learning Systems against Inference Attacks with ARM TrustZone

Authors: Aghiles Ait Messaoud, Sonia Ben Mokhtar, Vlad Nitu, Valerio Schiavoni | Published: 2022-08-11 | Updated: 2022-10-15
Client-Side Defense
Poisoning
Attack Method

Membership Inference Attacks via Adversarial Examples

Authors: Hamid Jalalzai, Elie Kadoche, Rémi Leluc, Vincent Plassier | Published: 2022-07-27 | Updated: 2022-11-23
Membership Inference
Attack Method
Machine Learning

Perception-Aware Attack: Creating Adversarial Music via Reverse-Engineering Human Perception

Authors: Rui Duan, Zhe Qu, Shangqing Zhao, Leah Ding, Yao Liu, Zhuo Lu | Published: 2022-07-26
Performance Evaluation
Attack Method
Speech Recognition Process

Careful What You Wish For: on the Extraction of Adversarially Trained Models

Authors: Kacem Khaled, Gabriela Nicolescu, Felipe Gohring de Magalhães | Published: 2022-07-21
Poisoning
Attack Method
Adversarial Example

Digital Twin-based Intrusion Detection for Industrial Control Systems

Authors: Seba Anna Varghese, Alireza Dehlaghi Ghadim, Ali Balador, Zahra Alimadadi, Panos Papadimitratos | Published: 2022-07-20
ML-Based IDS
Framework
Attack Method

DualCF: Efficient Model Extraction Attack from Counterfactual Explanations

Authors: Yongjie Wang, Hangwei Qian, Chunyan Miao | Published: 2022-05-13
Attack Methods against DFL
Query Generation Method
Attack Method

l-Leaks: Membership Inference Attacks with Logits

Authors: Shuhao Li, Yajie Wang, Yuanzhang Li, Yu-an Tan | Published: 2022-05-13
Performance Evaluation
Membership Inference
Attack Method

How to Combine Membership-Inference Attacks on Multiple Updated Models

Authors: Matthew Jagielski, Stanley Wu, Alina Oprea, Jonathan Ullman, Roxana Geambasu | Published: 2022-05-12
Performance Evaluation
Membership Inference
Attack Method

Do You Think You Can Hold Me? The Real Challenge of Problem-Space Evasion Attacks

Authors: Harel Berger, Amit Dvir, Chen Hajaj, Rony Ronen | Published: 2022-05-09
Malware Classification
Attack Method
Durability Issue