Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
White Box Security
biblio
Analysis of Fileless Malware and its Evasive Behavior
Submitted by grigby1 on Thu, 03/04/2021 - 1:45pm
static and advanced malware analysis
malware threats
Memory Analysis
Metrics
operating systems
Payloads
PowerShell (PS)
pubcrawl
resilience
security
malware
Task Analysis
tools
Trojan horses
white box
White Box Security
Windows Management Instrumentation (WMI)
Windows operating system
Windows Operating System Security
computer viruses
privacy
Predictive Metrics
Human behavior
Resiliency
Advance Volatile Threat
Advance Volatile Threat (AVT)
composability
computer systems
Malware Analysis
different malware
evasion
executable malware
file-based malware
fileless malware
Instruments
internet
invasive software
biblio
Introducing Code Assets of a New White-Box Security Modeling Language
Submitted by grigby1 on Thu, 03/04/2021 - 1:35pm
Metrics
white-box security modeling language
White-box security
WB security analysis
testing
specification languages
source code (software)
software protection technologies
software protection solutions
Software
Security modeling language
reverse engineer
Resiliency
resilience
pubcrawl
White Box Security
i-WBS
Data protection
Conferences
Computer crime
Computational modeling
composability
code security
code assets
Binary codes
binary code
attacker
Analytical models
security
white box
biblio
Evading Deepfake-Image Detectors with White- and Black-Box Attacks
Submitted by grigby1 on Thu, 03/04/2021 - 1:35pm
security of data
neural nets
neural network
optimization
Perturbation methods
popular forensic approach
pubcrawl
resilience
Resiliency
Robustness
Metrics
significant vulnerabilities
social networking (online)
state- of-the-art classifier
synthesizer
synthetic content
synthetically-generated content
target classifier
Training
Twitter
fraudulent social media profiles
white box
security
attack case studies
AUC
black-box attack
composability
deepfake-image detectors
disinformation campaigns
Forensics
White Box Security
Generators
image area
image classification
Image forensics
image generators
image representation
image sensors
image-forensic classifiers
learning (artificial intelligence)
biblio
Practical and White-Box Anomaly Detection through Unsupervised and Active Learning
Submitted by grigby1 on Thu, 03/04/2021 - 1:35pm
pubcrawl
white-box anomaly detection
user experience
Unsupervised Learning
Unsupervised Anomaly Detection
Time series analysis
time series
supervised learning
security of data
RRCF algorithm
RRCF
robust random cut forest
Resiliency
resilience
random forests
White Box Security
Neural networks
Monitoring
Metrics
Labeling
KPI anomaly detection framework
key performance indicators
iRRCF
Forestry
composability
Anomaly Detection
active learning
security
white box
biblio
Automating the BGE Attack on White-Box Implementations of AES with External Encodings
Submitted by grigby1 on Thu, 03/04/2021 - 1:34pm
reverse engineering
white-box cryptography
White Box Security
white box cryptography
white box
test equipment
standards
Software systems
security
secure software
Automated Secure Software Engineering
Resiliency
resilience
pubcrawl
Metrics
Manuals
encoding
Consumer electronics
composability
biblio
Fooling A Deep-Learning Based Gait Behavioral Biometric System
Submitted by grigby1 on Thu, 03/04/2021 - 1:34pm
Metrics
FGSM
FGSM iterations
gait behavioral biometrics
gradient methods
LSTM
machine learning algorithms
machine learning model
mature techniques
fast gradient sign method
privacy
pubcrawl
resilience
Resiliency
shadow model
Training
user behavioral information
white-box attacks
black-box attack
white box
security
adversarial learning attacks
Adversarial Machine Learning
authentication
authorisation
Biological system modeling
biometrics (access control)
White Box Security
Classification algorithms
composability
counter spoofing threats
deep learning (artificial intelligence)
Deep-learning
deep-learning based gait behavioral biometric system
end-user devices
extent FGSM
biblio
Transparent IFC Enforcement: Possibility and (In)Efficiency Results
Submitted by grigby1 on Thu, 03/04/2021 - 1:34pm
security lattice
programming languages
pubcrawl
real-world programs
resilience
Resiliency
Runtime
secure information flow control
Secure Multi-Execution
secure programs
security condition
polynomial time
security of data
Semantics
SME family
termination insensitive noninterference
third-party systems
transparency
transparent enforcement
transparent IFC enforcement
white-box
FlowFox browser
white box
security
black-box
black-box enforcement
Browsers
composability
computational complexity
Computer languages
efficiency
faceted secure multiexecution
White Box Security
FSME
IFC community
Information Flow Control
Lattices
memory overhead
Metrics
Multiple Facets
no-write-down no-read-up style security policy
noninterference
biblio
Implementation White Box Cryptography in Substitution-Permutation network
Submitted by grigby1 on Thu, 03/04/2021 - 1:33pm
resilience
white-box cryptography
White Box Security
white box
substitution-permutation network
side-channel attacks
Side-channel attack
security
Resiliency
white box cryptography
pubcrawl
privacy
Metrics
leak channels
Information Leakage
Cryptography
composability
biblio
Black Box to White Box: Discover Model Characteristics Based on Strategic Probing
Submitted by grigby1 on Thu, 03/04/2021 - 1:33pm
tuning
White Box Security
Libraries
machine learning
model characteristics
Probes
pubcrawl
resilience
security
security of data
strategic probing
text analysis
text generation
text transformer
Training
Training data
learning (artificial intelligence)
white box
white box adversarial attacks
Black Box Attacks
composability
Metrics
Resiliency
adversarial attacks
architecture attribution
black box encryption
deep classifier
GPT-2
image based classifiers
image classification
Industries
biblio
Encrypted-Input Program Obfuscation: Simultaneous Security Against White-Box and Black-Box Attacks
Submitted by grigby1 on Thu, 03/04/2021 - 1:33pm
pubcrawl
Logic gates
machine learning
machine learning as a service
machine learning programs
Metrics
program confidentiality
program obfuscation
provable program obfuscation solution
learning (artificial intelligence)
range membership programs
resilience
security
traditional cryptographic program obfuscation model
white box
white box cryptography
White Box Security
white-box attacks
cloud services
Resiliency
Predictive Metrics
Compositionality
Black Box Attacks
black box encryption
black-box attacks
Cloud Computing
cloud programs
provable security
composability
Computational modeling
Cryptography
data privacy
Decision trees
encrypted-input program obfuscation
encryption
equivalent unobfuscated program
« first
‹ previous
1
2
3
4
5
next ›
last »