Advancing Software Security and Reliability in Cloud Platforms through AI-based Anomaly Detection

SM Saleh, IM Sayem, N Madhavji… - Proceedings of the 2024 …, 2024 - dl.acm.org
Continuous Integration/Continuous Deployment (CI/CD) is fundamental for advanced
software development, supporting faster and more efficient delivery of code changes into …

[PDF][PDF] Automated Information Leakage Detection: A New Method Combining Machine Learning and Hypothesis Testing with an Application to Side-channel Detection …

P Gupta, A Ramaswamy, JP Drees, E Hüllermeier… - ICAART (2 …, 2022 - researchgate.net
Due to the proliferation of a large amount of publicly available data, information leakage (IL)
has become a major problem. IL occurs when secret (sensitive) information of a system is …

On the security of TLS in the real world

R Merget - 2023 - hss-opus.ub.ruhr-unibochum.de
RUB-Repository - On the security of TLS in the real world Deutsch OPUS UB Bochum RUB
» Bibliotheksportal Home Search Browse Publish FAQ OPUS UB Bochum On the security of …

[PDF][PDF] Pushing the AutoSCA Tool to Picosecond Precision: Improving Timing Side Channel Detection

DM Funke - 2022 - researchgate.net
The Auto-SCA tool is a powerful instrument for detecting TLS side-channels, developed by
Drees et al.[1]. Their novel approach of training binary classifiers on network traces to …

[PDF][PDF] TLS-Attacker: A Dynamic Framework for Analyzing TLS Implementations

F Bäumer, M Brinkmann, N Erinola, S Hebrok… - … Competition and Impact …, 2024 - acsac.org
TLS-Attacker is an open-source framework for analyzing Transport Layer Security (TLS)
implementations. The framework allows users to specify custom protocol flows and provides …

[PDF][PDF] How Machine Learning Enables Automated Side-Channel Detection

JP Drees - 2023 - researchgate.net
In a world where digital communication has become ubiquitous, protecting it against
malicious actors is as important as ever. This is where modern cryptography shines, using …

Design Theory Methods and their Applications to the Science of Security

B Garn - 2023 - repositum.tuwien.at
This Thesis introduces the research program Design Theory Framework for the Science of
Security (DEFSYS) and presents its application to four areas of information security. The …