脆弱性分析

PORTFILER: Port-Level Network Profiling for Self-Propagating Malware Detection

Authors: Talha Ongun, Oliver Spohngellert, Benjamin Miller, Simona Boboila, Alina Oprea, Tina Eliassi-Rad, Jason Hiser, Alastair Nottingham, Jack Davidson, Malathi Veeraraghavan | Published: 2021-12-27 | Updated: 2022-05-24
特徴エンジニアリング
脆弱性分析
通信解析

Detecting Security Fixes in Open-Source Repositories using Static Code Analyzers

Authors: Therese Fehrer, Rocío Cabrera Lozoya, Antonino Sabetta, Dario Di Nucci, Damian A. Tamburri | Published: 2021-05-07
コード変更分析
特徴選択手法
脆弱性分析

Code2Image: Intelligent Code Analysis by Computer Vision Techniques and Application to Vulnerability Prediction

Authors: Zeki Bilgin | Published: 2021-05-07
コード変更分析
トークン分布分析
脆弱性分析

Tackling Imbalanced Data in Cybersecurity with Transfer Learning: A Case with ROP Payload Detection

Authors: Haizhou Wang, Peng Liu | Published: 2021-05-06
クラス不均衡
データ前処理
脆弱性分析

An Overview of Laser Injection against Embedded Neural Network Models

Authors: Mathieu Dumont, Pierre-Alain Moellic, Raphael Viera, Jean-Max Dutertre, Rémi Bernhard | Published: 2021-05-04
ハードウェアセキュリティ
敵対的サンプルの脆弱性
脆弱性分析

Who’s Afraid of Adversarial Transferability?

Authors: Ziv Katzir, Yuval Elovici | Published: 2021-05-02 | Updated: 2022-10-06
敵対的サンプル
敵対的サンプルの脆弱性
脆弱性分析

Stealthy Backdoors as Compression Artifacts

Authors: Yulong Tian, Fnu Suya, Fengyuan Xu, David Evans | Published: 2021-04-30
バックドア攻撃
モデル圧縮のリスク
脆弱性分析

Automated Software Vulnerability Assessment with Concept Drift

Authors: Triet H. M. Le, Bushra Sabir, M. Ali Babar | Published: 2021-03-21
パフォーマンス評価
概念漂流
脆弱性分析

Diagnosing Vulnerability of Variational Auto-Encoders to Adversarial Attacks

Authors: Anna Kuzina, Max Welling, Jakub M. Tomczak | Published: 2021-03-10 | Updated: 2021-05-06
モデル性能評価
敵対的攻撃
脆弱性分析

Finding Effective Security Strategies through Reinforcement Learning and Self-Play

Authors: Kim Hammar, Rolf Stadler | Published: 2020-09-17 | Updated: 2020-10-04
ゲーム理論
深層強化学習
脆弱性分析