Zobrazeno 1 - 9
of 9
pro vyhledávání: '"Lisa Bahler"'
Autor:
Giovanni Di Crescenzo, David Bruce Cousins, Yuriy Polyakov, Lisa Bahler, Brian A. Coan, Kurt Rohloff
Publikováno v:
Data and Applications Security and Privacy XXXV ISBN: 9783030812416
DBSec
DBSec
We consider the problem of protecting image classifiers simultaneously from inspection attacks (i.e., attacks that have read access to all details in the program’s code) and black-box attacks (i.e., attacks where have input/output access to the pro
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::0a4db1512a609879799f8db60f43906c
https://doi.org/10.1007/978-3-030-81242-3_8
https://doi.org/10.1007/978-3-030-81242-3_8
Autor:
Kurt Rohloff, Yuriy Polyakov, David Bruce Cousins, Giovanni Di Crescenzo, Lisa Bahler, Brian A. Coan
Publikováno v:
CCSW@CCS
Machine Learning as a Service (aka MLaaS) and Smart Grid as a Service (aka SGaaS) are expected to grow at a significant rate. Just like most cloud services, MLaaS and SGaaS can be subject to a number of attacks. In this paper, we focus on white-box a
Publikováno v:
CNS
We consider the problem of protecting cloud services from simultaneous white-box and black-box attacks. Recent research in cryptographic program obfuscation considers the problem of protecting the confidentiality of programs and any secrets in them.
Publikováno v:
TrustCom/BigDataSE
We study the problem of securing machine learning classifiers against intrusion attacks (i.e., attacks that somehow retrieve the classifier model parameters). We show that efficient cryptographic program obfuscation techniques turn out to be a very u
Autor:
Brian A. Coan, David Bruce Cousins, Kurt Rohloff, Yuriy Polyakov, Lisa Bahler, Giovanni Di Crescenzo
Publikováno v:
HPCS
Point function obfuscators have recently been shown to be the first examples of program obfuscators provable under hardness assumptions commonly used in cryptography. This is remarkable, in light of early results in this area, showing impossibility o
Publikováno v:
MILCOM
Current malware detection and classification tools fail to adequately address variants that are generated automatically using new polymorphic and metamorphic transformation engines that can produce variants that bear no resemblance to one another. Cu
Autor:
Josephine Micallef, R. Snyder Shane, Hira Agrawal, William Conner, James L. Alberi, Alexandr Virodov, Lisa Bahler
Publikováno v:
2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE.
Current malware detection tools focus largely on malicious code that is injected into target programs by outsiders by exploiting inadvertent vulnerabilities such as failing to guard against a buffer overflow or failure to properly validate a user inp
Publikováno v:
Web Information Systems Engineering – WISE 2007 ISBN: 9783540769927
WISE
WISE
As software organizations develop systems based on service-oriented architectures (SOAs), the role of systems engineers (SEs) is crucial. They drive the process, in a top-down fashion, from the vantage point of the business domain. The SE, utilizing
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::fcd873ede54e9d9074d83f7ccd7376f4
https://doi.org/10.1007/978-3-540-76993-4_39
https://doi.org/10.1007/978-3-540-76993-4_39
Publikováno v:
EDOC
Market drivers to deliver software-based business solutions faster and cheaper have promoted the evolution of software system architectures toward assemblies of encapsulated components offering well-defined services - a service-oriented architecture.