Search Results - "Rieck, Konrad"
-
1
Automatic Inference of Search Patterns for Taint-Style Vulnerabilities
Published in 2015 IEEE Symposium on Security and Privacy (01-05-2015)“…Taint-style vulnerabilities are a persistent problem in software development, as the recently discovered "Heart bleed" vulnerability strikingly illustrates. In…”
Get full text
Conference Proceeding -
2
Modeling and Discovering Vulnerabilities with Code Property Graphs
Published in 2014 IEEE Symposium on Security and Privacy (01-05-2014)“…The vast majority of security breaches encountered today are a direct result of insecure code. Consequently, the protection of computer systems critically…”
Get full text
Conference Proceeding -
3
Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection
Published in IEEE transactions on dependable and secure computing (01-07-2019)“…To cope with the increasing variability and sophistication of modern attacks, machine learning has been widely adopted as a statistically-sound tool for…”
Get full text
Journal Article -
4
Toward Supervised Anomaly Detection
Published in The Journal of artificial intelligence research (01-01-2013)“…Anomaly detection is being regarded as an unsupervised learning task as anomalies stem from adversarial or unlikely events with unknown distributions. However,…”
Get full text
Journal Article -
5
ZOE: Content-Based Anomaly Detection for Industrial Control Systems
Published in 2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) (01-06-2018)“…Due its complexity and a multitude of proprietary components, industrial control systems are an immanently difficult field of application for intrusion…”
Get full text
Conference Proceeding -
6
Similarity measures for sequential data
Published in Wiley interdisciplinary reviews. Data mining and knowledge discovery (01-07-2011)“…Expressive comparison of strings is a prerequisite for analysis of sequential data in many areas of computer science. However, comparing strings and assessing…”
Get full text
Journal Article -
7
Backdooring and Poisoning Neural Networks with Image-Scaling Attacks
Published in 2020 IEEE Security and Privacy Workshops (SPW) (01-05-2020)“…Backdoors and poisoning attacks are a major threat to the security of machine-learning and vision systems. Often, however, these attacks leave visible…”
Get full text
Conference Proceeding -
8
Evaluating Explanation Methods for Deep Learning in Security
Published in 2020 IEEE European Symposium on Security and Privacy (EuroS&P) (01-09-2020)“…Deep learning is increasingly used as a building block of security systems. Unfortunately, neural networks are hard to interpret and typically opaque to the…”
Get full text
Conference Proceeding -
9
Forgotten Siblings: Unifying Attacks on Machine Learning and Digital Watermarking
Published in 2018 IEEE European Symposium on Security and Privacy (EuroS&P) (01-04-2018)“…Machine learning is increasingly used in securitycritical applications, such as autonomous driving, face recognition, and malware detection. Most learning…”
Get full text
Conference Proceeding -
10
Special issue on threat detection, analysis and defense
Published in Journal of information security and applications (01-07-2014)Get full text
Journal Article -
11
Monte Carlo Localization for path-based mobility in mobile wireless sensor networks
Published in 2016 IEEE Wireless Communications and Networking Conference (01-04-2016)“…Localization is a mandatory requirement in Wireless Sensor Networks (WSNs). Many solutions focus on static networks and do not account for mobility. In this…”
Get full text
Conference Proceeding -
12
On the Detection of Image-Scaling Attacks in Machine Learning
Published 23-10-2023“…Image scaling is an integral part of machine learning and computer vision systems. Unfortunately, this preprocessing step is vulnerable to so-called…”
Get full text
Journal Article -
13
Adversarial Machine Learning Against Digital Watermarking
Published in 2018 26th European Signal Processing Conference (EUSIPCO) (01-09-2018)“…Machine learning and digital watermarking are independent research areas. Their methods, however, are vulnerable to similar attacks if operated in an…”
Get full text
Conference Proceeding -
14
Backdooring and Poisoning Neural Networks with Image-Scaling Attacks
Published 19-03-2020“…Backdoors and poisoning attacks are a major threat to the security of machine-learning and vision systems. Often, however, these attacks leave visible…”
Get full text
Journal Article -
15
Efficient and Flexible Discovery of PHP Application Vulnerabilities
Published in 2017 IEEE European Symposium on Security and Privacy (EuroS&P) (01-04-2017)“…The Web today is a growing universe of pages and applications teeming with interactive content. The security of such applications is of the utmost importance,…”
Get full text
Conference Proceeding -
16
Privacy Threats through Ultrasonic Side Channels on Mobile Devices
Published in 2017 IEEE European Symposium on Security and Privacy (EuroS&P) (01-04-2017)“…Device tracking is a serious threat to the privacy of users, as it enables spying on their habits and activities. A recent practice embeds ultrasonic beacons…”
Get full text
Conference Proceeding -
17
Misleading Deep-Fake Detection with GAN Fingerprints
Published in 2022 IEEE Security and Privacy Workshops (SPW) (01-05-2022)“…Generative adversarial networks (GANs) have made remarkable progress in synthesizing realistic-looking images that effectively outsmart even humans. Although…”
Get full text
Conference Proceeding -
18
I still know it's you! On Challenges in Anonymizing Source Code
Published 26-08-2022“…The source code of a program not only defines its semantics but also contains subtle clues that can identify its author. Several studies have shown that these…”
Get full text
Journal Article -
19
Misleading Deep-Fake Detection with GAN Fingerprints
Published 25-05-2022“…Generative adversarial networks (GANs) have made remarkable progress in synthesizing realistic-looking images that effectively outsmart even humans. Although…”
Get full text
Journal Article -
20
Hunting for Truth: Analyzing Explanation Methods in Learning-based Vulnerability Discovery
Published in 2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P) (01-07-2023)“…Recent research has developed a series of methods for finding vulnerabilities in software using machine learning. While the proposed methods provide a…”
Get full text
Conference Proceeding