Search Results for author: Martín Ochoa

Found 5 papers, 1 papers with code

FooBaR: Fault Fooling Backdoor Attack on Neural Network Training

1 code implementation23 Sep 2021 Jakub Breier, Xiaolu Hou, Martín Ochoa, Jesus Solano

In particular, we discuss attacks against ReLU activation functions that make it possible to generate a family of malicious inputs, which are called fooling inputs, to be used at inference time to induce controlled misclassifications.

Backdoor Attack Image Classification

Improving Network Intrusion Detection Classifiers by Non-payload-Based Exploit-Independent Obfuscations: An Adversarial Approach

no code implementations7 May 2018 Ivan Homoliak, Martin Teknos, Martín Ochoa, Dominik Breitenbacher, Saeid Hosseini, Petr Hanacek

Machine-learning based intrusion detection classifiers are able to detect unknown attacks, but at the same time, they may be susceptible to evasion by obfuscation techniques.

Cryptography and Security C.2.0

Gamifying Education and Research on ICS Security: Design, Implementation and Results of S3

no code implementations10 Feb 2017 Daniele Antonioli, Hamid Reza Ghaeini, Sridhar Adepu, Martín Ochoa, Nils Ole Tippenhauer

In this work, we consider challenges relating to security for Industrial Control Systems (ICS) in the context of ICS security education and research targeted both to academia and industry.

Cryptography and Security

SIPHON: Towards Scalable High-Interaction Physical Honeypots

no code implementations10 Jan 2017 Juan Guarnizo, Amit Tambe, Suman Sankar Bhunia, Martín Ochoa, Nils Tippenhauer, Asaf Shabtai, Yuval Elovici

Based on this setup, six physical IP cameras, one NVR and one IP printer are presented as 85 real IoT devices on the Internet, attracting a daily traffic of 700MB for a period of two months.

Cryptography and Security

FEEBO: An Empirical Evaluation Framework for Malware Behavior Obfuscation

no code implementations11 Feb 2015 Sebastian Banescu, Tobias Wüchner, Marius Guggenmos, Martín Ochoa, Alexander Pretschner

We propose and implement such a framework that obfuscates the observable behavior of malware binaries.

Cryptography and Security

Cannot find the paper you are looking for? You can Submit a new open access paper.