no code implementations • 1 Jun 2022 • Huang Xiao, Battista Biggio, Blaine Nelson, Han Xiao, Claudia Eckert, Fabio Roli
Machine learning algorithms are increasingly being applied in security-related tasks such as spam and malware detection, although their security properties against deliberate attacks have not yet been widely understood.
2 code implementations • 12 Jul 2018 • Paul Muntean, Martin Monperrus, Hao Sun, Jens Grossklags, Claudia Eckert
Thus, in this paper, we propose a novel technique to provide automatic repairs of integer overflows in C source code.
Software Engineering
no code implementations • 21 Apr 2018 • Huang Xiao, Battista Biggio, Gavin Brown, Giorgio Fumera, Claudia Eckert, Fabio Roli
Learning in adversarial settings is becoming an important task for application domains where attackers may inject malicious data into the training set to subvert normal operation of data-driven technologies.
1 code implementation • 12 Mar 2018 • Bojan Kolosnjaji, Ambra Demontis, Battista Biggio, Davide Maiorca, Giorgio Giacinto, Claudia Eckert, Fabio Roli
Machine-learning methods have already been exploited as useful tools for detecting malicious executable files.
Cryptography and Security