Search Results

EVA: An Encrypted Vector Arithmetic Language and Compiler for Efficient Homomorphic Computation

4 code implementations27 Dec 2019

We believe that EVA would enable a wider adoption of FHE by making it easier to develop FHE applications and domain-specific FHE compilers.

Adversarial Attacks on ML Defense Models Competition

1 code implementation15 Oct 2021

Due to the vulnerability of deep neural networks (DNNs) to adversarial examples, a large number of defense techniques have been proposed to alleviate this problem in recent years.

Adversarial Attack Adversarial Robustness +1

Cross-Language Binary-Source Code Matching with Intermediate Representations

1 code implementation19 Jan 2022

Binary-source code matching plays an important role in many security and software engineering related tasks such as malware detection, reverse engineering and vulnerability assessment.

Malware Detection

Deep-CAPTCHA: a deep learning based CAPTCHA solver for vulnerability assessment

1 code implementation15 Jun 2020

In this paper, we present our customised deep neural network model, we review the research gaps, the existing challenges, and the solutions to cope with the issues.

CAPTCHA Detection

Lifting Network Protocol Implementation to Precise Format Specification with Security Applications

1 code implementation19 May 2023

It is well-known that static analysis does not rely on any input packets and can achieve high coverage by scanning every piece of code.

Cryptography and Security Programming Languages

ReGVD: Revisiting Graph Neural Networks for Vulnerability Detection

1 code implementation14 Oct 2021

Identifying vulnerabilities in the source code is essential to protect the software systems from cyber security attacks.

Graph Embedding text-classification +2

Programmable In-Network Security for Context-aware BYOD Policies

1 code implementation4 Aug 2019

Recent work has developed SDN solutions to collect device context for network-wide access control in a central controller.

Networking and Internet Architecture Cryptography and Security

Präzi: From Package-based to Call-based Dependency Networks

1 code implementation23 Jan 2021

Such networks help answer questions such as "How many packages have dependencies to packages with known security issues?"

Software Engineering

Chrowned by an Extension: Abusing the Chrome DevTools Protocol through the Debugger API

1 code implementation19 May 2023

The Chromium open-source project has become a fundamental piece of the Web as we know it today, with multiple vendors offering browsers based on its codebase.

Cryptography and Security

Domain-Centered Support for Layout, Tasks, and Specification for Control Flow Graph Visualization

2 code implementations6 Aug 2021

However, general graph drawing layouts, including the hierarchical ones frequently applied to CFGs, do not capture CFG-specific structures or tasks and thus the resulting drawing may not match the needs of their audience, especially for more complicated programs.

Human-Computer Interaction