Cybersecurity

S3C2 Summit 2023-06: Government Secure Supply Chain Summit

Authors: William Enck, Yasemin Acar, Michel Cukier, Alexandros Kapravelos, Christian Kästner, Laurie Williams | Published: 2023-08-13
SBOM Practices
Cybersecurity
Security Assurance

Theoretically Principled Trade-off for Stateful Defenses against Query-Based Black-Box Attacks

Authors: Ashish Hooda, Neal Mangaokar, Ryan Feng, Kassem Fawaz, Somesh Jha, Atul Prakash | Published: 2023-07-30
Cybersecurity
Adversarial Spectrum Attack Detection
Watermark Robustness

The GANfather: Controllable generation of malicious activity to improve defence systems

Authors: Ricardo Ribeiro Pereira, Jacopo Bono, João Tiago Ascensão, David Aparício, Pedro Ribeiro, Pedro Bizarro | Published: 2023-07-25
Cybersecurity
Data Generation
Classification of Malicious Actors

Malware Resistant Data Protection in Hyper-connected Networks: A survey

Authors: Jannatul Ferdous, Rafiqul Islam, Maumita Bhattacharya, Md Zahidul Islam | Published: 2023-07-24
Cybersecurity
Malware Propagation Means
Classification of Malicious Actors

On building machine learning pipelines for Android malware detection: a procedural survey of practices, challenges and opportunities

Authors: Masoud Mehrabi Koushki, Ibrahim AbuAlhaol, Anandharaju Durai Raju, Yang Zhou, Ronnie Salvador Giagone, Huang Shengqiang | Published: 2023-06-12
Role of MLSecOps
Cybersecurity
Malware Detection

SoK: Pragmatic Assessment of Machine Learning for Network Intrusion Detection

Authors: Giovanni Apruzzese, Pavel Laskov, Johannes Schneider | Published: 2023-04-30
Cybersecurity
Adversarial Attack Methods
Operational Scenario

A survey on hardware-based malware detection approaches

Authors: Cristiano Pegoraro Chenet, Alessandro Savino, Stefano Di Carlo | Published: 2023-03-22 | Updated: 2024-04-18
Challenges of HPC
Cybersecurity
Machine Learning Technology

DRSM: De-Randomized Smoothing on Malware Classifier Providing Certified Robustness

Authors: Shoumik Saha, Wenxiao Wang, Yigitcan Kaya, Soheil Feizi, Tudor Dumitras | Published: 2023-03-20 | Updated: 2023-10-03
Cybersecurity
Membership Inference
Machine Learning Technology

A Survey on Explainable Artificial Intelligence for Cybersecurity

Authors: Gaith Rjoub, Jamal Bentahar, Omar Abdel Wahab, Rabeb Mizouni, Alyssa Song, Robin Cohen, Hadi Otrok, Azzam Mourad | Published: 2023-03-07 | Updated: 2023-06-11
XAI (Explainable AI)
Cybersecurity
Explainability

COOKIEGRAPH: Understanding and Detecting First-Party Tracking Cookies

Authors: Shaoor Munir, Sandra Siby, Umar Iqbal, Steven Englehardt, Zubair Shafiq, Carmela Troncoso | Published: 2022-08-25 | Updated: 2023-11-27
Cybersecurity
Privacy Violation
User Activity Analysis