Search Results for author: Claudia Eckert

Found 4 papers, 2 papers with code

Support Vector Machines under Adversarial Label Contamination

no code implementations1 Jun 2022 Huang Xiao, Battista Biggio, Blaine Nelson, Han Xiao, Claudia Eckert, Fabio Roli

Machine learning algorithms are increasingly being applied in security-related tasks such as spam and malware detection, although their security properties against deliberate attacks have not yet been widely understood.

Active Learning BIG-bench Machine Learning +1

IntRepair: Informed Repairing of Integer Overflows

2 code implementations12 Jul 2018 Paul Muntean, Martin Monperrus, Hao Sun, Jens Grossklags, Claudia Eckert

Thus, in this paper, we propose a novel technique to provide automatic repairs of integer overflows in C source code.

Software Engineering

Is feature selection secure against training data poisoning?

no code implementations21 Apr 2018 Huang Xiao, Battista Biggio, Gavin Brown, Giorgio Fumera, Claudia Eckert, Fabio Roli

Learning in adversarial settings is becoming an important task for application domains where attackers may inject malicious data into the training set to subvert normal operation of data-driven technologies.

Computational Efficiency Data Poisoning +2

Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables

1 code implementation12 Mar 2018 Bojan Kolosnjaji, Ambra Demontis, Battista Biggio, Davide Maiorca, Giorgio Giacinto, Claudia Eckert, Fabio Roli

Machine-learning methods have already been exploited as useful tools for detecting malicious executable files.

Cryptography and Security

Cannot find the paper you are looking for? You can Submit a new open access paper.