no code implementations • 9 Aug 2023 • Zahra Moti, Asuman Senol, Hamid Bostani, Frederik Zuiderveen Borgesius, Veelasha Moonsamy, Arunesh Mathur, Gunes Acar
To address this gap, we present a measurement of tracking and (targeted) advertising on websites directed at children.
no code implementations • 30 May 2022 • Hamid Bostani, Zhengyu Zhao, Zhuoran Liu, Veelasha Moonsamy
Realistic attacks in the Android malware domain create Realizable Adversarial Examples (RealAEs), i. e., AEs that satisfy the domain constraints of Android malware.
no code implementations • 7 Oct 2021 • Hamid Bostani, Veelasha Moonsamy
The proposed manipulation technique is a query-efficient optimization algorithm that can find and inject optimal sequences of transformations into malware apps.
1 code implementation • 9 Sep 2020 • Carlo Meijer, Veelasha Moonsamy, Jos Wetzels
The continuing use of proprietary cryptography in embedded systems across many industry verticals, from physical access control systems and telecommunications to machine-to-machine authentication, presents a significant obstacle to black-box security-evaluation efforts.
Cryptography and Security 68M25 E.3
1 code implementation • 16 Jul 2020 • Rafa Gálvez, Veelasha Moonsamy, Claudia Diaz
In this paper we present LiM ("Less is More"), a malware classification framework that leverages Federated Learning to detect and classify malicious apps in a privacy-respecting manner.