Mass-producing failures of multimodal systems with language models
Deployed multimodal models can fail in ways that evaluators did not anticipate. In order to
find these failures before deployment, we introduce MultiMon, a system that automatically …
find these failures before deployment, we introduce MultiMon, a system that automatically …
Towards inspecting and eliminating trojan backdoors in deep neural networks
A trojan backdoor is a hidden pattern typically implanted in a deep neural network (DNN). It
could be activated and thus forces that infected model to behave abnormally when an input …
could be activated and thus forces that infected model to behave abnormally when an input …
Malware detection on windows audit logs using LSTMs
Malware is a constant threat and is continuously evolving. Security systems try to keep up
with the constant change. One challenge that arises is the large amount of logs generated …
with the constant change. One challenge that arises is the large amount of logs generated …
Adversarial adaptive neighborhood with feature importance-aware convex interpolation
Adversarial Examples threaten to fool deep learning models to output erroneous predictions
with high confidence. Optimization-based methods for constructing such samples have been …
with high confidence. Optimization-based methods for constructing such samples have been …
Effectiveness of security through obscurity methods to avoid web application vulnerability scanners
A Kurniawan, K Ramli - Jurnal Teknik Informatika (Jutif), 2023 - jutif.if.unsoed.ac.id
The concept of security through obscurity is not recommended by the National Institute of
Standards and Technology (NIST) as a form of system security. Basically this concept hides …
Standards and Technology (NIST) as a form of system security. Basically this concept hides …
The Financial Risk of a Deficiency of Cybersecurity in Industrial Process Controlled Facilities; A Qualitative Multiple Case Study
OL Theiring - 2023 - search.proquest.com
Industrial control systems are the automated and robotic controls that manufacturing facilities
have been integrating into manufacturing equipment since the late 18th century. The …
have been integrating into manufacturing equipment since the late 18th century. The …
Understanding & Mitigating the Challenges of Securing Jupyter Notebooks Online
A Ramsingh, P Verma - … on Cyber Security and Resilience (CSR …, 2024 - ieeexplore.ieee.org
Jupyter Notebook applications have become increasingly popular online. However, the
threats against this application are also on the rise. Each year, the attacks and exploitation …
threats against this application are also on the rise. Each year, the attacks and exploitation …
MAlign: Explainable static raw-byte based malware family classification using sequence alignment
For a long time, malware classification and analysis have been an arms-race between
antivirus systems and malware authors. Though static analysis is vulnerable to evasion …
antivirus systems and malware authors. Though static analysis is vulnerable to evasion …
On Counter-Adversarial Resilience in Permeable Networked Systems
HW Behrens - 2023 - search.proquest.com
In recent years, a flood of devices has permeated our personal and professional lives, with
increasingly interconnected networks playing an ever-growing role in day-to-day activities …
increasingly interconnected networks playing an ever-growing role in day-to-day activities …