Activation Analysis of a Byte-Based Deep Neural Network for Malware Classification (Englisch)
- Neue Suche nach: Coull, Scott E.
- Neue Suche nach: Gardner, Christopher
- Neue Suche nach: Coull, Scott E.
- Neue Suche nach: Gardner, Christopher
In:
2019 IEEE Security and Privacy Workshops (SPW)
;
21-27
;
2019
-
ISBN:
- Aufsatz (Konferenz) / Elektronische Ressource
-
Titel:Activation Analysis of a Byte-Based Deep Neural Network for Malware Classification
-
Beteiligte:Coull, Scott E. ( Autor:in ) / Gardner, Christopher ( Autor:in )
-
Erschienen in:
-
Verlag:
- Neue Suche nach: IEEE
-
Erscheinungsdatum:01.05.2019
-
Format / Umfang:1178635 byte
-
ISBN:
-
DOI:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Datenquelle:
Inhaltsverzeichnis Konferenzband
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Title Page i| 2019
- 1
-
On the Robustness of Deep K-Nearest NeighborsSitawarin, Chawin / Wagner, David et al. | 2019
- 3
-
Title Page iii| 2019
- 4
-
Copyright Page| 2019
- 5
-
Table of Contents| 2019
- 8
-
Exploring Adversarial Examples in Malware DetectionSuciu, Octavian / Coull, Scott E. / Johns, Jeffrey et al. | 2019
- 9
-
Message from the Workshop General Chair| 2019
- 11
-
Message from the DLS Organizers| 2019
- 12
-
DLS 2019 Organization| 2019
- 14
-
Message from the IWPE 2019 Organizers| 2019
- 15
-
Targeted Adversarial Examples for Black Box Audio SystemsTaori, Rohan / Kamsetty, Amog / Chu, Brenton / Vemuri, Nikita et al. | 2019
- 15
-
IWPE 2019 Organization| 2019
- 16
-
Message from the SafeThings 2019 Organizers| 2019
- 17
-
SafeThings 2019 Organization| 2019
- 18
-
Message from the WTMC 2019 Organizers| 2019
- 20
-
WTMC 2019 Organization| 2019
- 21
-
Activation Analysis of a Byte-Based Deep Neural Network for Malware ClassificationCoull, Scott E. / Gardner, Christopher et al. | 2019
- 28
-
MaxNet: Neural Network Architecture for Continuous Detection of Malicious ActivityGronat, Petr / Aldana-Iuit, Javier Alejandro / Balek, Martin et al. | 2019
- 36
-
Deep in the Dark - Deep Learning-Based Malware Traffic Detection Without Expert KnowledgeMarin, Gonzalo / Casas, Pedro / Capdehourat, German et al. | 2019
- 43
-
Defending Against Neural Network Model Stealing Attacks Using Deceptive PerturbationsLee, Taesung / Edwards, Benjamin / Molloy, Ian / Su, Dong et al. | 2019
- 50
-
Membership Inference Attacks Against Adversarially Robust Deep Learning ModelsSong, Liwei / Shokri, Reza / Mittal, Prateek et al. | 2019
- 57
-
Efficient Evaluation of Activation Functions over Encrypted DataThaine, Patricia / Gorbunov, Sergey / Penn, Gerald et al. | 2019
- 64
-
Privacy Risk Assessment for Data Subject-Aware Threat ModelingSion, Laurens / Van Landuyt, Dimitri / Wuyts, Kim / Joosen, Wouter et al. | 2019
- 72
-
Differential Inference Testing: A Practical Approach to Evaluate Sanitizations of DatasetsKassem, Ali / Acs, Gergely / Castelluccia, Claude / Palamidessi, Catuscia et al. | 2019
- 80
-
Knowledge is Power: Systematic Reuse of Privacy Knowledge for Threat ElicitationWuyts, Kim / Sion, Laurens / Van Landuyt, Dimitri / Joosen, Wouter et al. | 2019
- 84
-
You Talk Too Much: Limiting Privacy Exposure Via Voice InputVaidya, Tavish / Sherr, Micah et al. | 2019
- 92
-
After GDPR, Still Tracking or Not? Understanding Opt-Out States for Online Behavioral AdvertisingSakamoto, Takahito / Matsunaga, Masahiro et al. | 2019
- 100
-
A Privacy-Aware V-Model for Software DevelopmentAl-Momani, Ala'a / Kargl, Frank / Schmidt, Robert / Kung, Antonio / Bosch, Christoph et al. | 2019
- 105
-
SwitchMan: An Easy-to-Use Approach to Secure User Input and OutputZheng, Shengbao / Zhou, Zhenyu / Tang, Heyi / Yang, Xiaowei et al. | 2019
- 114
-
ROS-Defender: SDN-Based Security Policy Enforcement for Robotic ApplicationsRivera, Sean / Lagraa, Sofiane / Nita-Rotaru, Cristina / Becker, Sheila / State, Radu et al. | 2019
- 120
-
Resilience of Multi-robot Systems to Physical Masquerade AttacksWardega, Kacper / Tron, Roberto / Li, Wenchao et al. | 2019
- 126
-
Ensuring the Safe and Secure Operation of Electronic Control Units in Road VehiclesKohnhauser, Florian / Pullen, Dominik / Katzenbeisser, Stefan et al. | 2019
- 132
-
Are Self-Driving Cars Secure? Evasion Attacks Against Deep Neural Networks for Steering Angle PredictionChernikova, Alesia / Oprea, Alina / Nita-Rotaru, Cristina / Kim, BaekGyu et al. | 2019
- 138
-
Analysis of the Susceptibility of Smart Home Programming Interfaces to End User ErrorPalekar, Mitali / Fernandes, Earlence / Roesner, Franziska et al. | 2019
- 144
-
Smart Speaker Privacy Control - Acoustic Tagging for Personal Voice AssistantsCheng, Peng / Bagci, Ibrahim Ethem / Yan, Jeff / Roedig, Utz et al. | 2019
- 150
-
When Smart Devices Are Stupid: Negative Experiences Using Home Smart DevicesHe, Weijia / Martinez, Jesse / Padhi, Roshni / Zhang, Lefan / Ur, Blase et al. | 2019
- 156
-
Side Channel Attacks in Computation Offloading Systems with GPU VirtualizationLiu, Sihang / Wei, Yizhou / Chi, Jianfeng / Shezan, Faysal Hossain / Tian, Yuan et al. | 2019
- 162
-
Demo: An Emulator-Based Active Protection System Against IoT MalwareCheng, Shin-Ming / Ma, Sheng-Hao et al. | 2019
- 163
-
SpyCon: Adaptation Based Spyware in Human-in-the-Loop IoTElmalaki, Salma / Ho, Bo-Jhang / Alzantot, Moustafa / Shoukry, Yasser / Srivastava, Mani et al. | 2019
- 169
-
Devil in the Detail: Attack Scenarios in Industrial ApplicationsDuque Anton, Simon D. / Hafner, Alexander / Schotten, Hans Dieter et al. | 2019
- 175
-
IOTFLA : A Secured and Privacy-Preserving Smart Home Architecture Implementing Federated LearningAivodji, Ulrich Matchi / Gambs, Sebastien / Martin, Alexandre et al. | 2019
- 181
-
A Study of Vulnerability Analysis of Popular Smart Devices Through Their Companion AppsMauro Junior, Davino / Melo, Luis / Lu, Hao / dAmorim, Marcelo / Prakash, Atul et al. | 2019
- 187
-
A Smörgåsbord of Typos: Exploring International Keyboard Layout TyposquattingLe Pochat, Victor / Van Goethem, Tom / Joosen, Wouter et al. | 2019
- 193
-
Characterizing Vulnerability of DNS AXFR Transfers with Global-Scale ScanningSkwarek, Marcin / Korczynski, Maciej / Mazurczyk, Wojciech / Duda, Andrzej et al. | 2019
- 199
-
Assessing the Effectiveness of Domain Blacklisting Against Malicious DNS RegistrationsVissers, Thomas / Janssen, Peter / Joosen, Wouter / Desmet, Lieven et al. | 2019
- 205
-
Analysing Censorship Circumvention with VPNs Via DNS Cache SnoopingFarnan, Oliver / Wright, Joss / Darer, Alexander et al. | 2019
- 212
-
Feasibility of a Keystroke Timing Attack on Search Engines with AutocompleteMonaco, John V. et al. | 2019
- 218
-
Detecting Malicious Campaigns in Obfuscated JavaScript with Scalable Behavioral AnalysisStarov, Oleksii / Zhou, Yuchen / Wang, Jun et al. | 2019
- 224
-
Counting Outdated Honeypots: Legal and UsefulVetterl, Alexander / Clayton, Richard / Walden, Ian et al. | 2019
- 230
-
MLSEC - Benchmarking Shallow and Deep Machine Learning Models for Network SecurityCasas, Pedro / Marin, Gonzalo / Capdehourat, German / Korczynski, Maciej et al. | 2019
- 236
-
IEC 60870-5-104 Network Characterization of a Large-Scale Operational Power GridMai, Kelvin / Qin, Xi / Ortiz Silva, Neil / Cardenas, Alvaro A. et al. | 2019
- 242
-
Victim Routine Influences the Number of DDoS Attacks: Evidence from Dutch Educational NetworkAbhishta, Abhishta / Junger, Marianne / Joosten, Reinoud / Nieuwenhuis, Lambert J.M. et al. | 2019
- 249
-
Author Index| 2019