default search action
39th SP 2018: San Francisco, CA, USA - Workshops
- 2018 IEEE Security and Privacy Workshops, SP Workshops 2018, San Francisco, CA, USA, May 24, 2018. IEEE Computer Society 2018, ISBN 978-1-5386-8276-0
DLS: Deep Learning and Security Workshop
- Nicholas Carlini, David A. Wagner:
Audio Adversarial Examples: Targeted Attacks on Speech-to-Text. 1-7 - Joshua Saxe, Richard E. Harang, Cody Wild, Hillary Sanders:
A Deep Learning Approach to Fast, Format-Agnostic Detection of Malicious Web Content. 8-14 - Penny Chong, Yi Xiang Marcus Tan, Juan Guarnizo, Yuval Elovici, Alexander Binder:
Mouse Authentication Without the Temporal Aspect - What Does a 2D-CNN Learn? 15-21 - Jonathan Woodbridge, Hyrum S. Anderson, Anjum Ahuja, Daniel Grant:
Detecting Homoglyph Attacks with a Siamese Neural Network. 22-28 - Rohan Doshi, Noah J. Apthorpe, Nick Feamster:
Machine Learning DDoS Detection for Consumer Internet of Things Devices. 29-35 - Jernej Kos, Ian Fischer, Dawn Song:
Adversarial Examples for Generative Models. 36-42 - Jamie Hayes, George Danezis:
Learning Universal Adversarial Perturbations with Generative Models. 43-49 - Ji Gao, Jack Lanchantin, Mary Lou Soffa, Yanjun Qi:
Black-Box Generation of Adversarial Text Sequences to Evade Deep Learning Classifiers. 50-56 - Ruggiero Dargenio, Shashank Srikant, Erik Hemberg, Una-May O'Reilly:
Exploring the Use of Autoencoders for Botnets Traffic Representation. 57-62 - Savvas Zannettou, Sotirios Chatzis, Kostantinos Papadamou, Michael Sirivianos:
The Good, the Bad and the Bait: Detecting and Characterizing Clickbait on YouTube. 63-69 - Maria Rigaki, Sebastian García:
Bringing a GAN to a Knife-Fight: Adapting Malware Communication to Avoid Detection. 70-75 - Abdullah Al-Dujaili, Alex Huang, Erik Hemberg, Una-May O'Reilly:
Adversarial Deep Learning for Robust Detection of Binary Encoded Malware. 76-82 - Z. Berkay Celik, Patrick D. McDaniel:
Extending Detection with Privileged Information via Generalized Distillation. 83-88 - Hojjat Aghakhani, Aravind Machiry, Shirin Nilizadeh, Christopher Kruegel, Giovanni Vigna:
Detecting Deceptive Reviews Using Generative Adversarial Networks. 89-95 - Michael McCoyd, David A. Wagner:
Background Class Defense Against Adversarial Examples. 96-102 - Amir Asiaee T., Hardik Goel, Shalini Ghosh, Vinod Yegneswaran, Arindam Banerjee:
Time Series Deinterleaving of DNS Traffic. 103-108 - Li Chen, Salmin Sultana, Ravi Sahita:
HeNet: A Deep Learning Approach on Intel® Processor Trace for Effective Exploit Detection. 109-115 - Konstantin Böttinger, Patrice Godefroid, Rishabh Singh:
Deep Reinforcement Fuzzing. 116-122 - Qixue Xiao, Kang Li, Deyue Zhang, Weilin Xu:
Security Risks in Deep Learning Implementations. 123-128
SADFE: Systematic Approaches to Digital Forensic Engineering
- Felix Anda, David Lillis, Nhien-An Le-Khac, Mark Scanlon:
Evaluating Automated Facial Age Estimation Techniques for Digital Forensics. 129-139 - Qian Chen, Qing Liao, Zoe Lin Jiang, Junbin Fang, Siu-Ming Yiu, Guikai Xi, Rong Li, Zhengzhong Yi, Xuan Wang, Lucas C. K. Hui, Dong Liu, En Zhang:
File Fragment Classification Using Grayscale Image Conversion and Deep Learning in Digital Forensics. 140-147 - Chi Yuen Tseung, Kam-Pui Chow:
Forensic-Aware Anti-DDoS Device. 148-159 - Zhen Xu, Chen Shi, Chris Chao-Chun Cheng, Neil Zhenqiang Gong, Yong Guan:
A Dynamic Taint Analysis Tool for Android App Forensics. 160-169 - Shoufu Luo, Jeremy D. Seideman, Sven Dietrich:
Fingerprinting Cryptographic Protocols with Key Exchange Using an Entropy Measure. 170-179 - Kul Prasad Subedi, Daya Ram Budhathoki, Dipankar Dasgupta:
Forensic Analysis of Ransomware Families Using Static and Dynamic Analysis. 180-185 - Ananya Yarramreddy, Peter Gromkowski, Ibrahim M. Baggili:
Forensic Analysis of Immersive Virtual Reality Social Applications: A Primary Account. 186-196
WRIT: Workshop on Research for Insider Threat
- Frank L. Greitzer, Justin Purl, Yung Mei Leong, D. E. Sunny Becker:
SOFIT: Sociotechnical and Organizational Factors for Insider Threat. 197-206 - Michael Mylrea, Sri Nikhil Gupta Gourisetti, Curtis Larimer, Christine F. Noonan:
Insider Threat Cybersecurity Framework Webtool & Methodology: Defending Against Complex Cyber-Physical Threats. 207-216 - Flavio Toffalini, Ivan Homoliak, Athul Harilal, Alexander Binder, Martín Ochoa:
Detection of Masqueraders Based on Graph Partitioning of File System Access Events. 217-227 - Preetam Dutta, Gabriel Ryan, Aleksander Zieba, Salvatore J. Stolfo:
Simulated User Bots: Real Time Testing of Insider Threat Detection Systems. 228-236 - Andrew P. Moore, Tracy M. Cassidy, Michael C. Theis, Daniel Bauer, Denise M. Rousseau, Susan B. Moore:
Balancing Organizational Incentives to Counter Insider Threat. 237-246 - Derrick Spooner, George Silowash, Daniel Costa, Michael Albrethsen:
Navigating the Insider Threat Tool Landscape: Low Cost Technical Solutions to Jump Start an Insider Threat Program. 247-257
BioStar: Workshop on Bio-inspired Security, Trust, Assurance and Resilience
- Vysakh S. Mohan, R. Vinayakumar, Soman K. P, Prabaharan Poornachandran:
S.P.O.O.F Net: Syntactic Patterns for identification of Ominous Online Factors. 258-263 - Abbas Acar, Hidayet Aksu, A. Selcuk Uluagac, Kemal Akkaya:
WACA: Wearable-Assisted Continuous Authentication. 264-269 - Duc C. Le, Nur Zincir-Heywood:
Evaluating Insider Threat Detection Workflow Using Supervised and Unsupervised Learning. 270-275 - Nanda Kumar Thanigaivelan, Ethiopia Nigussie, Seppo Virtanen, Jouni Isoaho:
Towards Human Bio-Inspired Defence Mechanism for Cyber Security. 276-280 - Gonzalo P. Suárez, Lazaros K. Gallos, Nina H. Fefferman:
A Case Study in Tailoring a Bio-Inspired Cyber-Security Algorithm: Designing Anomaly Detection for Multilayer Networks. 281-286 - Esraa M. Ghourab, Effat Samir, Mohamed Azab, Mohamed Eltoweissy:
Diversity-Based Moving-Target Defense for Secure Wireless Vehicular Communications. 287-292 - Denis Gracanin, Adam D'Amico, Mark Manuel, Walter Carson, Mohamed Eltoweissy, Liang Cheng:
Biologically Inspired Safety and Security for Smart Built Environments: Position Paper. 293-298
LangSec: Workshop on Language-theoretic Security and Applications
- Keith Irwin:
Redesigning Secure Protocols to Compel Grammatical Compliance Checking. 299-305 - Jayakrishna Menon, Christophe Hauser, Yan Shoshitaishvili, Stephen Schwab:
A Binary Analysis Approach to Retrofit Security in Input Parsing Routines. 306-322 - Rodrigo Branco, Kekai Hu, Henrique Kawakami, Ke Sun:
A Mathematical Modeling of Exploitations and Mitigation Techniques Using Set Theory. 323-328 - Erik Poll:
LangSec Revisited: Input Security Flaws of the Second Kind. 329-334
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.