Exploring foci of
2025-04-16
Dimensional Robustness Certification for Deep Neural Networks in Network Intrusion Detection Systems
2025-04-16 • Mengdie Huang, Yingjun Lin, Xiaofeng Chen, Elisa Bertino
Network intrusion detection systems based on deep learning are gaining significant traction in cyber security due to their high prediction accuracy and strong adaptability to evolving cyber threats. However, a serious drawback is their vulnerability to evasion attacks that rely on adversarial examples. To provide robustness guarantees for deep neural networks against any possible perturbations, certified defenses against perturbations within a l p -bounded region around the input are being increasingly explored. U…
Two-Dimensional Gel Electrophoresis
Organic Certification
Three-Dimensional Chess
Riaa Certification
Product Certification
Four-Dimensional Space
2.5 Dimensional Seduction
Ccie Certification
Music Recording Certification
Exploring foci of
2025-07-12
LLMalMorph: On The Feasibility of Generating Variant Malware using Large-Language-Models
2025-07-12 • Md Ajwad Akil, Adrian Shuai Li, Imtiaz Karim, Arun Iyengar, Ashish Kundu, Vinny Parla, Elisa Bertino
Large Language Models (LLMs) have transformed software development and automated code generation. Motivated by these advancements, this paper explores the feasibility of LLMs in modifying malware source code to generate variants. We introduce LLMalMorph, a semi-automated framework that leverages semantical and syntactical code comprehension by LLMs to generate new malware variants. LLMalMorph extracts function-level information from the malware source code and employs custom-engineered prompts coupled with strateg…
Three Mile Island Nuclear Generating Station
Vogtle Electric Generating Plant
Palo Verde Nuclear Generating Station
Bruce Nuclear Generating Station
Speech-Generating Device
San Onofre Nuclear Generating Station
Feasibility Study
Generating Set Of A Group
Moment-Generating Function
Exploring foci of
2025-05-29
LLM Agents Should Employ Security Principles
2025-05-29 • Kaiyuan Zhang, Zian Su, Pin‐Yu Chen, Elisa Bertino, Xiangyu Zhang, Ninghui Li
Large Language Model (LLM) agents show considerable promise for automating complex tasks using contextual reasoning; however, interactions involving multiple agents and the system's susceptibility to prompt injection and other forms of context manipulation introduce new vulnerabilities related to privacy leakage and system exploitation. This position paper argues that the well-established design principles in information security, which are commonly referred to as security principles, should be employed when deplo…
Stuff You Should Know
Agents Of Mayhem
Agents Of S.H.I.E.L.D. Season 1
Agents Of S.H.I.E.L.D. (Season 7)
You Should See Me In A Crown
I Should Coco
Agents Of S.H.I.E.L.D. (Season 5)
Agents Of S.H.I.E.L.D. (Season 2)
Agents Of Fortune
Exploring foci of
2025-05-09
Efficient Full-Stack Private Federated Deep Learning with Post-Quantum Security
2025-05-09 • Yiwei Zhang, Rouzbeh Behnia, Attila A. Yavuz, Mohammadreza Ebrahimi, Elisa Bertino
Federated learning (FL) enables collaborative model training while preserving user data privacy by keeping data local. Despite these advantages, FL remains vulnerable to privacy attacks on user updates and model parameters during training and deployment. Secure aggregation protocols have been proposed to protect user updates by encrypting them, but these methods often incur high computational costs and are not resistant to quantum computers. Additionally, differential privacy (DP) has been used to mitigate privacy…
Private Life (2018 Film)
The Private Memoirs And Confessions Of A Justified Sinner
Private University
Private Limited Company
Private Benjamin (1980 Film)
Private Browsing
Public–Private Partnership
Private Dancer
Private Eyes (Tv Series)
Exploring foci of
2025-08-02
VWAttacker: A Systematic Security Testing Framework for Voice over WiFi User Equipments
2025-08-02 • Imtiaz Karim, Hassan Jameel Asghar, Seulgi Han, Mashroor Hasan Bhuiyan, Elisa Bertino
We present VWAttacker, the first systematic testing framework for analyzing the security of Voice over WiFi (VoWiFi) User Equipment (UE) implementations. VWAttacker includes a complete VoWiFi network testbed that communicates with Commercial-Off-The-Shelf (COTS) UEs based on a simple interface to test the behavior of diverse VoWiFi UE implementations; uses property-guided adversarial testing to uncover security issues in different UEs systematically. To reduce manual effort in extracting and testing properties, we…
Joint Security Area
Tokenization (Data Security)
United States Army Intelligence And Security Command
Physical Security
Communications Security Establishment
Hardware Security Module
Operations Security
International Ship And Port Facility Security Code
National Security Guard