Evasion is not enough: A case study of android malware H Berger, C Hajaj, A Dvir International symposium on cyber security cryptography and machine learning …, 2020 | 18 | 2020 |
Crystal ball: From innovative attacks to attack effectiveness classifier H Berger, C Hajaj, E Mariconti, A Dvir IEEE Access 10, 1317-1333, 2021 | 16* | 2021 |
A wrinkle in time: a case study in DNS poisoning H Berger, AZ Dvir, M Geva International Journal of Information Security 20, 313-329, 2021 | 15 | 2021 |
StableYolo: optimizing image generation for large language models H Berger, A Dakhama, Z Ding, K Even-Mendoza, D Kelly, H Menendez, ... International Symposium on Search Based Software Engineering, 133-139, 2023 | 6 | 2023 |
Breaking the structure of MaMaDroid H Berger, A Dvir, E Mariconti, C Hajaj Expert Systems with Applications 228, 120429, 2023 | 6* | 2023 |
Do you think you can hold me? the real challenge of problem-space evasion attacks H Berger, A Dvir, C Hajaj, R Ronen arXiv preprint arXiv:2205.04293, 2022 | 4 | 2022 |
Problem-space evasion attacks in the Android OS: a survey H Berger, C Hajaj, A Dvir arXiv preprint arXiv:2205.14576, 2022 | 2 | 2022 |
Can you See me? On the Visibility of NOPs against Android Malware Detectors D Soi, D Maiorca, G Giacinto, H Berger arXiv preprint arXiv:2312.17356, 2023 | 1 | 2023 |
POPS: From History to Mitigation of DNS Cache Poisoning Attacks Y Afek, H Berger, A Bremler-Barr arXiv preprint arXiv:2501.13540, 2025 | | 2025 |
Measuring DNS Censorship of Generative AI Platforms H Berger, Y Shavitt arXiv preprint arXiv:2412.14286, 2024 | | 2024 |
Can You See It?-NOP! A Practitioners Study D Soi, L Regano, D Maiorca, G Giacinto, H Berger Twentieth Symposium on Usable Privacy and Security (SOUPS 2024), 2024 | | 2024 |
The Onion Unpeeled: User Perceptions vs. Realities of Tor's Security and Privacy Properties H Berger, T Hu, AJ Aviv, M Sherr Twentieth Symposium on Usable Privacy and Security (SOUPS 2024), 2024 | | 2024 |
Memorial of Fallen Soldiers vs. Post-Mortem Privacy: Perception Study H Berger Twentieth Symposium on Usable Privacy and Security (SOUPS 2024), 2024 | | 2024 |
Mobile Apps vs. Web Browsers: A User Perception Study with Android Apps and Google Chrome H Berger Twentieth Symposium on Usable Privacy and Security (SOUPS 2024), 2024 | | 2024 |
Dreaming with ChatGPT: Unraveling the Challenges of LLMs Dream Generation H Berger, H King, O David Proceedings of the 1st Workshop on NLP for Science (NLP4Science), 140-147, 2024 | | 2024 |
Poster: Pretrained Executable Language Models (ELMs) Excel at Malware Understanding L Kurlandski, H Berger, Y Pan, M Wright 33rd USENIX Security Symposium (USENIX Security 24), 2024 | | 2024 |
SCIF: Privacy-Preserving Statistics Collection with Input Validation and Full Security J Su, L Bangalore, H Berger, J Yi, A Castor, M Sherr, ... Cryptology ePrint Archive, 2024 | | 2024 |
A Production Suite for Failure Detectors J Dong, R Xin, H Berger, O Marin 2023 International Conference on Intelligent Computing and Next Generation …, 2023 | | 2023 |
Cadence: A Simulator for Human Movement-based Communication Protocols H Berger, M Sherr, A Aviv Proceedings of the 16th Cyber Security Experimentation and Test Workshop, 26-31, 2023 | | 2023 |
Evasion Is Not Enough: A Case Study H Berger, C Hajaj, A Dvir Cyber Security Cryptography and Machine Learning: Fourth International …, 2020 | | 2020 |