Secure Routine: A Routine-Based Algorithm for Drivers Identification

Authors: Davide Micale, Gianpiero Costantino, Ilaria Matteucci, Giuseppe Patanè, Giampaolo Bella | Published: 2021-12-12

Malware Classification Using Static Disassembly and Machine Learning

Authors: Zhenshuo Chen, Eoin Brophy, Tomas Ward | Published: 2021-12-10

On the Security & Privacy in Federated Learning

Authors: Gorka Abad, Stjepan Picek, Víctor Julio Ramírez-Durán, Aitor Urbieta | Published: 2021-12-10 | Updated: 2022-03-16

Automated Side Channel Analysis of Media Software with Manifold Learning

Authors: Yuanyuan Yuan, Qi Pang, Shuai Wang | Published: 2021-12-09 | Updated: 2021-12-10

ESAFE: Enterprise Security and Forensics at Scale

Authors: Bernard McShea, Kevin Wright, Denley Lam, Steve Schmidt, Anna Choromanska, Devansh Bisla, Shihong Fang, Alireza Sarmadi, Prashanth Krishnamurthy, Farshad Khorrami | Published: 2021-12-08

Membership Inference Attacks From First Principles

Authors: Nicholas Carlini, Steve Chien, Milad Nasr, Shuang Song, Andreas Terzis, Florian Tramer | Published: 2021-12-07 | Updated: 2022-04-12

Control Parameters Considered Harmful: Detecting Range Specification Bugs in Drone Configuration Modules via Learning-Guided Search

Authors: Ruidong Han, Chao Yang, Siqi Ma, JiangFeng Ma, Cong Sun, Juanru Li, Elisa Bertino | Published: 2021-12-07

Adversarial Machine Learning In Network Intrusion Detection Domain: A Systematic Review

Authors: Huda Ali Alatwi, Charles Morisset | Published: 2021-12-06

Does Proprietary Software Still Offer Protection of Intellectual Property in the Age of Machine Learning? — A Case Study using Dual Energy CT Data

Authors: Andreas Maier, Seung Hee Yang, Farhad Maleki, Nikesh Muthukrishnan, Reza Forghani | Published: 2021-12-06

When the Curious Abandon Honesty: Federated Learning Is Not Private

Authors: Franziska Boenisch, Adam Dziedzic, Roei Schuster, Ali Shahin Shamsabadi, Ilia Shumailov, Nicolas Papernot | Published: 2021-12-06 | Updated: 2023-04-12