1 code implementation • 23 Sep 2021 • Jakub Breier, Xiaolu Hou, Martín Ochoa, Jesus Solano
In particular, we discuss attacks against ReLU activation functions that make it possible to generate a family of malicious inputs, which are called fooling inputs, to be used at inference time to induce controlled misclassifications.
no code implementations • 7 May 2018 • Ivan Homoliak, Martin Teknos, Martín Ochoa, Dominik Breitenbacher, Saeid Hosseini, Petr Hanacek
Machine-learning based intrusion detection classifiers are able to detect unknown attacks, but at the same time, they may be susceptible to evasion by obfuscation techniques.
Cryptography and Security C.2.0
no code implementations • 10 Feb 2017 • Daniele Antonioli, Hamid Reza Ghaeini, Sridhar Adepu, Martín Ochoa, Nils Ole Tippenhauer
In this work, we consider challenges relating to security for Industrial Control Systems (ICS) in the context of ICS security education and research targeted both to academia and industry.
Cryptography and Security
no code implementations • 10 Jan 2017 • Juan Guarnizo, Amit Tambe, Suman Sankar Bhunia, Martín Ochoa, Nils Tippenhauer, Asaf Shabtai, Yuval Elovici
Based on this setup, six physical IP cameras, one NVR and one IP printer are presented as 85 real IoT devices on the Internet, attracting a daily traffic of 700MB for a period of two months.
Cryptography and Security
no code implementations • 11 Feb 2015 • Sebastian Banescu, Tobias Wüchner, Marius Guggenmos, Martín Ochoa, Alexander Pretschner
We propose and implement such a framework that obfuscates the observable behavior of malware binaries.
Cryptography and Security