Security Assurance

Understanding, Implementing, and Supporting Security Assurance Cases in Safety-Critical Domains

Authors: Mazen Mohamad | Published: 2025-01-08
Security Assurance
Risk Management
Workshop Survey

Ensuring superior learning outcomes and data security for authorized learner

Authors: Jeongho Bang, Wooyeong Song, Kyujin Shin, Yong-Su Kim | Published: 2025-01-01
Security Assurance
Improvement of Learning

SoK: Verifiable Cross-Silo FL

Authors: Aleksei Korneev, Jan Ramon | Published: 2024-10-11
Security Assurance
Cryptography

FullCert: Deterministic End-to-End Certification for Training and Inference of Neural Networks

Authors: Tobias Lorenz, Marta Kwiatkowska, Mario Fritz | Published: 2024-06-17 | Updated: 2024-09-11
Security Assurance
Convergence Analysis
Optimization Problem

Secure Software Development: Issues and Challenges

Authors: Sam Wen Ping, Jeffrey Cheok Jun Wah, Lee Wen Jie, Jeremy Bong Yong Han, Saira Muzafar | Published: 2023-11-18
Security Assurance
Software Security
Resource Scarcity Issues

Attesting Distributional Properties of Training Data for Machine Learning

Authors: Vasisht Duddu, Anudeep Das, Nora Khayata, Hossein Yalame, Thomas Schneider, N. Asokan | Published: 2023-08-18 | Updated: 2024-04-09
Security Assurance
Model Performance Evaluation
Robustness Evaluation

Diff-CAPTCHA: An Image-based CAPTCHA with Security Enhanced by Denoising Diffusion Model

Authors: Ran Jiang, Sanfeng Zhang, Linfeng Liu, Yanbing Peng | Published: 2023-08-16
Security Assurance
Attack Evaluation
Watermark Robustness

DIVAS: An LLM-based End-to-End Framework for SoC Security Analysis and Policy-based Protection

Authors: Sudipta Paria, Aritra Dasgupta, Swarup Bhunia | Published: 2023-08-14
LLM Security
Security Assurance
Vulnerability Mitigation Technique

S3C2 Summit 2023-06: Government Secure Supply Chain Summit

Authors: William Enck, Yasemin Acar, Michel Cukier, Alexandros Kapravelos, Christian Kästner, Laurie Williams | Published: 2023-08-13
SBOM Practices
Cybersecurity
Security Assurance

Bounding data reconstruction attacks with the hypothesis testing interpretation of differential privacy

Authors: Georgios Kaissis, Jamie Hayes, Alexander Ziller, Daniel Rueckert | Published: 2023-07-08
Algorithm Design
Security Assurance
Data Obfuscation