Zobrazeno 1 - 10
of 11
pro vyhledávání: '"Hojjat Aghakhani"'
Autor:
Thijs van Ede, Hojjat Aghakhani, Noah Spahn, Riccardo Bortolameotti, Marco Cova, Andrea Continella, Maarten van Steen, Andreas Peter, Christopher Kruegel, Giovanni Vigna
Publikováno v:
2022 IEEE Symposium on Security and Privacy (SP), 522-539
STARTPAGE=522;ENDPAGE=539;TITLE=2022 IEEE Symposium on Security and Privacy (SP)
STARTPAGE=522;ENDPAGE=539;TITLE=2022 IEEE Symposium on Security and Privacy (SP)
Security monitoring systems detect potentially malicious activities in IT infrastructures, by either looking for known signatures or for anomalous behaviors. Security operators investigate these events to determine whether they pose a threat to their
Autor:
Daniela Oliveira, Hojjat Aghakhani, Paulo Licio de Geus, Christopher Kruegel, André Grégio, Giovanni Vigna, Marcus Botacin, Stefano Ortolani
Publikováno v:
ACM Transactions on Privacy and Security. 24:1-31
Malware analysis is an essential task to understand infection campaigns, the behavior of malicious codes, and possible ways to mitigate threats. Malware analysis also allows better assessment of attackers’ capabilities, techniques, and processes. A
Autor:
Priyanka Bose, Dongyu Meng, Andrea Continella, Christopher Kruegel, Hojjat Aghakhani, Aravind Machiry, Giovanni Vigna, Michele Guerriero
Publikováno v:
ACM ASIA Conference on Computer and Communications Security (ASIACCS), 731-743
STARTPAGE=731;ENDPAGE=743;TITLE=ACM ASIA Conference on Computer and Communications Security (ASIACCS)
AsiaCCS
STARTPAGE=731;ENDPAGE=743;TITLE=ACM ASIA Conference on Computer and Communications Security (ASIACCS)
AsiaCCS
Software is continually increasing in size and complexity, and therefore, vulnerability discovery would benefit from techniques that identify potentially vulnerable regions within large code bases, as this allows for easing vulnerability detection by
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::87c8d9b92650194ea2ef104113a9a1fb
https://doi.org/10.1145/3433210.3453115
https://doi.org/10.1145/3433210.3453115
Publikováno v:
EuroS&P
A recent source of concern for the security of neural networks is the emergence of clean-label dataset poisoning attacks, wherein correctly labeled poison samples are injected into the training dataset. While these poison samples look legitimate to t
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::d58214372327c57fa05d4b90fced23f7
http://arxiv.org/abs/2005.00191
http://arxiv.org/abs/2005.00191
Autor:
Giovanni Vigna, Stefano Ortolani, Fabio Gritti, Davide Balzarotti, Francesco Mecca, Hojjat Aghakhani, Christopher Kruegel, Martina Lindorfer
Publikováno v:
Network and Distributed System Security Symposium
Network and Distributed System Security Symposium, Feb 2020, San Diego, United States. ⟨10.14722/ndss.2020.24310⟩
NDSS
Proceedings 2020 Network and Distributed System Security Symposium
Network and Distributed System Security Symposium, Feb 2020, San Diego, United States. ⟨10.14722/ndss.2020.24310⟩
NDSS
Proceedings 2020 Network and Distributed System Security Symposium
International audience; Machine learning techniques are widely used in addition to signatures and heuristics to increase the detection rate of anti-malware software, as they automate the creation of detection models, making it possible to handle an e
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::3b3e11c78c4946da1e2b0e7aedc75339
https://hal.science/hal-04093553/document
https://hal.science/hal-04093553/document
Autor:
Chani Jindal, Christopher Kruegel, Keith Long, Christopher Salls, Giovanni Vigna, Hojjat Aghakhani
Publikováno v:
ACSAC
Malware detection plays a vital role in computer security. Modern machine learning approaches have been centered around domain knowledge for extracting malicious features. However, many potential features can be used, and it is time consuming and dif
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::7ba4665739bd867d26e680d403f584c1
http://arxiv.org/abs/1910.11376
http://arxiv.org/abs/1910.11376
Publikováno v:
WWW (Companion Volume)
Many crowd-sourced review platforms, such as Yelp, TripAdvisor, and Foursquare, have sprung up to provide a shared space for people to write reviews and rate local businesses. With the substantial impact of businesses’ online ratings on their selli
Publikováno v:
WWW
While online review services provide a two-way conversation between brands and consumers, malicious actors, including misbehaving businesses, have an equal opportunity to distort the reviews for their own gains. We propose OneReview, a method for loc
Publikováno v:
Computer Methods and Programs in Biomedicine. 136:107-117
The propagation of signals via gap junctions is modeled by using evolutionary game theory.Game theory payoffs are considered to be a function of cellular context.The results show the gap junction communication reduces cancer progression.The model ill
Autor:
Aravind Machiry, Nilo Redini, Christopher Kruegel, Hojjat Aghakhani, Eric Gustafson, Giovanni Vigna
Publikováno v:
Proceedings 2019 Workshop on Binary Analysis Research.