Showing 1–20 of 35 results
/ Date/ Name
Feb 12, 2021Realizable Universal Adversarial Perturbations for MalwareNov 14, 2025Retrofit: Continual Learning with Controlled Forgetting for Binary Security Detection and AnalysisNov 21, 2013Tracking and Characterizing Botnets Using Automatically Generated DomainsFeb 2, 2024TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time (Extended Version)Aug 7, 2023Exploiting Code Symmetries for Learning Program SemanticsDec 16, 2020ROPfuscator: Robust Obfuscation with ROPFeb 11, 2022Jigsaw Puzzle: Selective Backdoor Attack to Subvert Malware ClassifiersNov 5, 2019Intriguing Properties of Adversarial ML Attacks in the Problem Space [Extended Version]Jul 20, 2018TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and TimeFeb 19, 2014PuppetDroid: A User-Centric UI Exerciser for Automatic Dynamic Analysis of Similar Android ApplicationsSep 20, 2023Locate and Verify: A Two-Stream Network for Improved Deepfake DetectionMay 23, 2025Learning to Focus: Context Extraction for Efficient Code Vulnerability Detection with Language ModelsDec 5, 2024On the Lack of Robustness of Binary Function Similarity SystemsJan 15, 2021Identifying Authorship Style in Malicious Binaries: Techniques, Challenges & DatasetsOct 8, 2020Transcending Transcend: Revisiting Malware Classification in the Presence of Concept DriftSep 18, 2023DFIL: Deepfake Incremental Learning by Exploiting Domain-invariant Forgery CluesJun 15, 2022Designing a Provenance Analysis for SGX EnclavesSep 17, 2025Beyond Classification: Evaluating LLMs for Fine-Grained Automatic Malware Behavior AuditingJun 21, 2023Do you still need a manual smart contract audit?Oct 19, 2020Dos and Don'ts of Machine Learning in Computer Security