Code authorship attribution: Methods and challenges
Code authorship attribution is the process of identifying the author of a given code. With
increasing numbers of malware and advanced mutation techniques, the authors of malware …
increasing numbers of malware and advanced mutation techniques, the authors of malware …
Dos and don'ts of machine learning in computer security
With the growing processing power of computing systems and the increasing availability of
massive datasets, machine learning algorithms have led to major breakthroughs in many …
massive datasets, machine learning algorithms have led to major breakthroughs in many …
A survey of detection methods for XSS attacks
Cross-site scripting attack (abbreviated as XSS) is an unremitting problem for the Web
applications since the early 2000s. It is a code injection attack on the client-side where an …
applications since the early 2000s. It is a code injection attack on the client-side where an …
[PDF][PDF] Drebin: Effective and explainable detection of android malware in your pocket.
Malicious applications pose a threat to the security of the Android platform. The growing
amount and diversity of these applications render conventional defenses largely ineffective …
amount and diversity of these applications render conventional defenses largely ineffective …
Towards making systems forget with machine unlearning
Today's systems produce a rapidly exploding amount of data, and the data further derives
more data, forming a complex data propagation network that we call the data's lineage …
more data, forming a complex data propagation network that we call the data's lineage …
Large language models for code analysis: Do {LLMs} really do their job?
Large language models (LLMs) have demonstrated significant potential in the realm of
natural language understanding and programming code processing tasks. Their capacity to …
natural language understanding and programming code processing tasks. Their capacity to …
Poisoning attacks against support vector machines
We investigate a family of poisoning attacks against Support Vector Machines (SVM). Such
attacks inject specially crafted training data that increases the SVM's test error. Central to the …
attacks inject specially crafted training data that increases the SVM's test error. Central to the …
{TESSERACT}: Eliminating experimental bias in malware classification across space and time
Is Android malware classification a solved problem? Published F1 scores of up to 0.99
appear to leave very little room for improvement. In this paper, we argue that results are …
appear to leave very little room for improvement. In this paper, we argue that results are …
Fingerprinting the fingerprinters: Learning to detect browser fingerprinting behaviors
Browser fingerprinting is an invasive and opaque stateless tracking technique. Browser
vendors, academics, and standards bodies have long struggled to provide meaningful …
vendors, academics, and standards bodies have long struggled to provide meaningful …
Crawlphish: Large-scale analysis of client-side cloaking techniques in phishing
Phishing is a critical threat to Internet users. Although an extensive ecosystem serves to
protect users, phishing websites are growing in sophistication, and they can slip past the …
protect users, phishing websites are growing in sophistication, and they can slip past the …