no code implementations • 20 Apr 2022 • Maximilian Noppel, Lukas Peter, Christian Wressnegger
We analyze different manifestations of such attacks for different explanation types in the image domain, before we resume to conduct a red-herring attack against malware classification.
1 code implementation • 26 Aug 2021 • Alexander Warnecke, Lukas Pirch, Christian Wressnegger, Konrad Rieck
In this paper, we propose the first method for unlearning features and labels.
no code implementations • 19 Oct 2020 • Daniel Arp, Erwin Quiring, Feargus Pendlebury, Alexander Warnecke, Fabio Pierazzi, Christian Wressnegger, Lorenzo Cavallaro, Konrad Rieck
With the growing processing power of computing systems and the increasing availability of massive datasets, machine learning algorithms have led to major breakthroughs in many different areas.
2 code implementations • 5 Jun 2019 • Alexander Warnecke, Daniel Arp, Christian Wressnegger, Konrad Rieck
Deep learning is increasingly used as a building block of security systems.
no code implementations • 25 Nov 2018 • Battista Biggio, Konrad Rieck, Davide Ariu, Christian Wressnegger, Igino Corona, Giorgio Giacinto, Fabio Roli
Clustering algorithms have become a popular tool in computer security to analyze the behavior of malware variants, identify novel malware families, and generate signatures for antivirus systems.
no code implementations • 19 Oct 2016 • Christian Wressnegger, Kevin Freeman, Fabian Yamaguchi, Konrad Rieck
Although anti-virus software has significantly evolved over the last decade, classic signature matching based on byte patterns is still a prevalent concept for identifying security threats.
Cryptography and Security