Search
Search Results
-
Tarallo: Evading Behavioral Malware Detectors in the Problem Space
Machine learning algorithms can effectively classify malware through dynamic behavior but are susceptible to adversarial attacks. Existing attacks,... -
S2malloc: Statistically Secure Allocator for Use-After-Free Protection and More
Attacks on heap memory are ever-increasing. Existing entropy-based secure memory allocators can provide statistical defenses against various... -
Using Semgrep OSS to Find OWASP Top 10 Weaknesses in PHP Applications: A Case Study
Given PHP’s continuous success, it remains an important task to ensure security in its applications. While code reviews are a common measure to catch... -
Constructs of Deceit: Exploring Nuances in Modern Social Engineering Attacks
Despite the increasing effort in the defense community to develop robust security solutions, social engineering attacks are getting more prevalent... -
Extended Abstract: Assessing Language Models for Semantic Textual Similarity in Cybersecurity
In light of the significant strides made by large language models (LLMs) in the field of natural language processing (NLP) [5], our research seeks to... -
GlueZilla: Efficient and Scalable Software to Hardware Binding using Rowhammer
Industrial-scale reverse engineering affects the majority of companies in the mechanical and plant engineering sector and imposes significant... -
Approach for the Optimization of Machine Learning Models for Calculating Binary Function Similarity
Binary function similarity comparison is essential in a variety of security fields, such as software vulnerability detection and malware analysis,... -
Presshammer: Rowhammer and Rowpress Without Physical Address Information
Modern DRAM is susceptible to fault attacks that undermine the entire system’s security. The most well-studied disturbance effect is Rowhammer, where... -
A Note on Failing Gracefully: Completing the Picture for Explicitly Rejecting Fujisaki-Okamoto Transforms Using Worst-Case Correctness
The Fujisaki-Okamoto (FO) transformation is used in most proposals for post-quantum secure key encapsulation mechanisms (KEMs) like, e.g.,... -
Reducing Signature Size of Matrix-Code-Based Signature Schemes
This paper shows novel techniques to reduce the signature size of the code-based signature schemes MEDS and ALTEQ, by a large factor. For both... -
Compact Encryption Based on Module-NTRU Problems
The Module-NTRU problem, introduced by Cheon, Kim, Kim, Son (IACR ePrint 2019/1468), and Chuengsatiansup, Prest, Stehlé, Wallet, Xagawa (ASIACCS... -
Fault Attack on SQIsign
In this paper, we introduce the first fault attack on SQIsign. By injecting a fault into the ideal generator during the commitment phase, we... -
The Blockwise Rank Syndrome Learning Problem and Its Applications to Cryptography
A notion of blockwise errors in the context of rank-based cryptography has recently been introduced in [28]. It allowed to choose more interesting... -
Post-quantum Secure ZRTP
ZRTP is an authenticated key exchange protocol for establishing secure communications for Voice over IP applications. In this paper, we devise a... -
Revisiting Anonymity in Post-quantum Public Key Encryption
This paper revisits the anonymity of post-quantum public key encryption in the presence of CCA attacks (ANO-CCA). Specifically, we demonstrate the... -
Hash Your Keys Before Signing
In this work, we analyze the so-called Beyond UnForgeability Features (BUFF) security of the submissions to the current standardization process of... -
State of the Art of HFE Variants
\(\textrm{HFE}\) (that stands for Hidden Field Equations)... -
Exploring Knowledge-Based Systems for Commercial Mortgage Underwriting
While the residential mortgage industry has benefited from automated mortgage applications and underwriting, the commercial mortgage industry still... -
Towards the Integration of Digital Avatars in Urban Digital Twins on the Cloud-to-Thing Continuum
Urban Digital Twins (UDTs) represent a powerful tool to effectively make cities smart. Over the last few years, the interest in the social aspects of... -
Tiny-ME Wasm: Description Logics Reasoning in Your Browser
The World Wide Web is increasingly adopted as an application development platform in desktop and mobile contexts. As a building block of the Semantic...