We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 41-60 of 10,000 results
  1. Tarallo: Evading Behavioral Malware Detectors in the Problem Space

    Machine learning algorithms can effectively classify malware through dynamic behavior but are susceptible to adversarial attacks. Existing attacks,...
    Gabriele Digregorio, Salvatore Maccarrone, ... Stefano Zanero in Detection of Intrusions and Malware, and Vulnerability Assessment
    Conference paper 2024
  2. S2malloc: Statistically Secure Allocator for Use-After-Free Protection and More

    Attacks on heap memory are ever-increasing. Existing entropy-based secure memory allocators can provide statistical defenses against various...
    Conference paper 2024
  3. Using Semgrep OSS to Find OWASP Top 10 Weaknesses in PHP Applications: A Case Study

    Given PHP’s continuous success, it remains an important task to ensure security in its applications. While code reviews are a common measure to catch...
    Lukas Kree, René Helmke, Eugen Winter in Detection of Intrusions and Malware, and Vulnerability Assessment
    Conference paper 2024
  4. Constructs of Deceit: Exploring Nuances in Modern Social Engineering Attacks

    Despite the increasing effort in the defense community to develop robust security solutions, social engineering attacks are getting more prevalent...
    Mohammad Ali Tofighi, Behzad Ousat, ... Amin Kharraz in Detection of Intrusions and Malware, and Vulnerability Assessment
    Conference paper 2024
  5. Extended Abstract: Assessing Language Models for Semantic Textual Similarity in Cybersecurity

    In light of the significant strides made by large language models (LLMs) in the field of natural language processing (NLP) [5], our research seeks to...
    Arian Soltani, DJeff Kanda Nkashama, ... Froduald Kabanza in Detection of Intrusions and Malware, and Vulnerability Assessment
    Conference paper 2024
  6. GlueZilla: Efficient and Scalable Software to Hardware Binding using Rowhammer

    Industrial-scale reverse engineering affects the majority of companies in the mechanical and plant engineering sector and imposes significant...
    Ruben Mechelinck, Daniel Dorfmeister, ... Stefan Brunthaler in Detection of Intrusions and Malware, and Vulnerability Assessment
    Conference paper 2024
  7. Approach for the Optimization of Machine Learning Models for Calculating Binary Function Similarity

    Binary function similarity comparison is essential in a variety of security fields, such as software vulnerability detection and malware analysis,...
    Suguru Horimoto, Keane Lucas, Lujo Bauer in Detection of Intrusions and Malware, and Vulnerability Assessment
    Conference paper 2024
  8. Presshammer: Rowhammer and Rowpress Without Physical Address Information

    Modern DRAM is susceptible to fault attacks that undermine the entire system’s security. The most well-studied disturbance effect is Rowhammer, where...
    Jonas Juffinger, Sudheendra Raghav Neela, ... Daniel Gruss in Detection of Intrusions and Malware, and Vulnerability Assessment
    Conference paper 2024
  9. A Note on Failing Gracefully: Completing the Picture for Explicitly Rejecting Fujisaki-Okamoto Transforms Using Worst-Case Correctness

    The Fujisaki-Okamoto (FO) transformation is used in most proposals for post-quantum secure key encapsulation mechanisms (KEMs) like, e.g.,...
    Kathrin Hövelmanns, Christian Majenz in Post-Quantum Cryptography
    Conference paper 2024
  10. Reducing Signature Size of Matrix-Code-Based Signature Schemes

    This paper shows novel techniques to reduce the signature size of the code-based signature schemes MEDS and ALTEQ, by a large factor. For both...
    Tung Chou, Ruben Niederhagen, ... Simona Samardjiska in Post-Quantum Cryptography
    Conference paper 2024
  11. Compact Encryption Based on Module-NTRU Problems

    The Module-NTRU problem, introduced by Cheon, Kim, Kim, Son (IACR ePrint 2019/1468), and Chuengsatiansup, Prest, Stehlé, Wallet, Xagawa (ASIACCS...
    Shi Bai, Hansraj Jangir, ... **wei Zheng in Post-Quantum Cryptography
    Conference paper 2024
  12. Fault Attack on SQIsign

    In this paper, we introduce the first fault attack on SQIsign. By injecting a fault into the ideal generator during the commitment phase, we...
    Jeonghwan Lee, Donghoe Heo, ... Seokhie Hong in Post-Quantum Cryptography
    Conference paper 2024
  13. The Blockwise Rank Syndrome Learning Problem and Its Applications to Cryptography

    A notion of blockwise errors in the context of rank-based cryptography has recently been introduced in [28]. It allowed to choose more interesting...
    Nicolas Aragon, Pierre Briaud, ... Adrien Vinçotte in Post-Quantum Cryptography
    Conference paper 2024
  14. Post-quantum Secure ZRTP

    ZRTP is an authenticated key exchange protocol for establishing secure communications for Voice over IP applications. In this paper, we devise a...
    Loïc Ferreira, Johan Pascal in Post-Quantum Cryptography
    Conference paper 2024
  15. Revisiting Anonymity in Post-quantum Public Key Encryption

    This paper revisits the anonymity of post-quantum public key encryption in the presence of CCA attacks (ANO-CCA). Specifically, we demonstrate the...
    Yao Cheng, **anhui Lu, ... Bao Li in Post-Quantum Cryptography
    Conference paper 2024
  16. Hash Your Keys Before Signing

    In this work, we analyze the so-called Beyond UnForgeability Features (BUFF) security of the submissions to the current standardization process of...
    Thomas Aulbach, Samed Düzlü, ... Maximiliane Weishäupl in Post-Quantum Cryptography
    Conference paper 2024
  17. State of the Art of HFE Variants

    \(\textrm{HFE}\) (that stands for Hidden Field Equations)...
    Benoît Cogliati, Gilles Macariot-Rat, ... Pierre Varjabedian in Post-Quantum Cryptography
    Conference paper 2024
  18. Exploring Knowledge-Based Systems for Commercial Mortgage Underwriting

    While the residential mortgage industry has benefited from automated mortgage applications and underwriting, the commercial mortgage industry still...
    K. Patricia Cannon, Simon J. Preis in Current Trends in Web Engineering
    Conference paper 2024
  19. Towards the Integration of Digital Avatars in Urban Digital Twins on the Cloud-to-Thing Continuum

    Urban Digital Twins (UDTs) represent a powerful tool to effectively make cities smart. Over the last few years, the interest in the social aspects of...
    Lorenzo Toro-Gálvez, Rafael García-Luque, ... Ernesto Pimentel in Current Trends in Web Engineering
    Conference paper 2024
  20. Tiny-ME Wasm: Description Logics Reasoning in Your Browser

    The World Wide Web is increasingly adopted as an application development platform in desktop and mobile contexts. As a building block of the Semantic...
    Giuseppe Loseto, Ivano Bilenchi, ... Michele Ruta in Current Trends in Web Engineering
    Conference paper 2024
Did you find what you were looking for? Share feedback.