Blog Archive
Other
- April 2024 - DeepSign: Deep Learning for Automatic Malware Signature Generation and Classification (Seminar 12.2)
- April 2024 - Automatic Yara Rule Generation Using Biclustering (Seminar 12.1)
- April 2024 - Passphrase and keystroke dynamics authentication: Usable security (Seminar 11.2)
- April 2024 - Online Binary Models are Promising for Distinguishing Temporally Consistent Computer Usage Profiles (Seminar 11.1)
- April 2024 - Lost at C: A User Study on the Security Implications of Large Language Model Code Assistants (Seminar 10.2)
- April 2024 - Examining Zero-Shot Vulnerability Repair with Large Language Models (Seminar 10.1)
- April 2024 - TrojanPuzzle: Covertly Poisoning Code-Suggestion Models (Seminar 9.2)
- April 2024 - Pop Quiz! Can a Large Language Model Help With Reverse Engineering? (Seminar 9.1)
- March 2024 - Adversarial Machine Learning in Image Classification: A Survey Toward the Defender’s Perspective (Seminar 8.2)
- March 2024 - EvadeDroid: A Practical Evasion Attack on Machine Learning for Black-box Android Malware Detection (Seminar 8.1)
- March 2024 - Mal-LSGAN: An Effective Adversarial Malware Example Generation Model (Seminar 7.2)
- March 2024 - Functionality-Preserving Black-Box Optimization of Adversarial Windows Malware (Seminar 7.1)
- March 2024 - No Need to Teach New Tricks to Old Malware: Winning an Evasion Challenge with XOR-based Adversarial Samples (Seminar 6.2)
- March 2024 - Shallow Security: on the Creation of Adversarial Variants to Evade Machine Learning-Based Malware Detectors (Seminar 6.1)
- February 2024 - Transcending TRANSCEND: Revisiting Malware Classification in the Presence of Concept Drift (Seminar 5.2)
- February 2024 - Transcend: Detecting Concept Drift in Malware Classification Models (Seminar 5.1)
- February 2024 - DroidEvolver: Self-Evolving Android Malware Detection System (Seminar 4.2)
- February 2024 - Fast & Furious: On the modelling of malware detection as an evolving data stream (Seminar 4.1)
- February 2024 - Dos and Don’ts of Machine Learning in Computer Security (Seminar 3.2)
- February 2024 - Dos and Don’ts of Machine Learning in Computer Security (Seminar 3.1)
- February 2024 - Machine Learning (In) Security: A Stream of Problems Part 2 (Seminar 2.2)
- February 2024 - Machine Learning (In) Security: A Stream of Problems Part 1 (Seminar 2.1)
- January 2024 - Malware Detection on Highly Imbalanced Data through Sequence Modeling (Seminar 1.2)
- January 2024 - Machine Learning for Malware Detection (Seminar 1.1)