QUAC-TRNG: High-Throughput True Random Number Generation Using Quadruple Row Activation in Commodity DRAM Chips

Authors: Ataberk Olgun, Minesh Patel, A. Giray Yağlıkçı, Haocong Luo, Jeremie S. Kim, Nisa Bostancı, Nandita Vijaykumar, Oğuz Ergin, Onur Mutlu | Published: 2021-05-19 | Updated: 2021-05-25

Darknet Data Mining — A Canadian Cyber-crime Perspective

Authors: Edward Crowder, Jay Lansiquot | Published: 2021-05-18

Machine learning on knowledge graphs for context-aware security monitoring

Authors: Josep Soler Garrido, Dominik Dold, Johannes Frank | Published: 2021-05-18

Adversarial Examples Detection with Bayesian Neural Network

Authors: Yao Li, Tongyi Tang, Cho-Jui Hsieh, Thomas C. M. Lee | Published: 2021-05-18 | Updated: 2024-02-23

On the Robustness of Domain Constraints

Authors: Ryan Sheatsley, Blaine Hoak, Eric Pauley, Yohan Beugin, Michael J. Weisman, Patrick McDaniel | Published: 2021-05-18 | Updated: 2021-11-07

RAIDER: Reinforcement-aided Spear Phishing Detector

Authors: Keelan Evans, Alsharif Abuadbba, Tingmin Wu, Kristen Moore, Mohiuddin Ahmed, Ganna Pogrebna, Surya Nepal, Mike Johnstone | Published: 2021-05-17 | Updated: 2023-01-03

Improving Vulnerability Prediction of JavaScript Functions Using Process Metrics

Authors: Tamás Viszkok, Péter Hegedűs, Rudolf Ferenc | Published: 2021-05-16

Undistillable: Making A Nasty Teacher That CANNOT teach students

Authors: Haoyu Ma, Tianlong Chen, Ting-Kuei Hu, Chenyu You, Xiaohui Xie, Zhangyang Wang | Published: 2021-05-16

Real-time Detection of Practical Universal Adversarial Perturbations

Authors: Kenneth T. Co, Luis Muñoz-González, Leslie Kanthan, Emil C. Lupu | Published: 2021-05-16 | Updated: 2021-05-22

Cybersecurity Anomaly Detection in Adversarial Environments

Authors: David A. Bierbrauer, Alexander Chang, Will Kritzer, Nathaniel D. Bastian | Published: 2021-05-14 | Updated: 2021-11-02