AI and Cybersecurity .- An Adversarial Robustness Benchmark for Enterprise Network Intrusion Detection.- Securing Smart Vehicles through Federated Learning.- Using Reed-Muller Codes for Classification with Rejection and Recovery.- Unsupervised Clustering of Honeypot Attacks by Deep HTTP Packet Inspection.- Security Analysis .- Practices for Assessing the Security Level of Solidity Smart Contracts.- Effectiveness of Binary-Level CFI Techniques.
- A Small World-Privacy Preserving IoT Device-type Fingerprinting with Small Datasets.- URSID: Automatically Refining a Single Attack Scenario into Multiple Cyber.- Phishing and Social Network .- Does the Anchoring Effect Influence Individuals' Anti-Phishing Behavior?.- IntelliTweet: a Multifaceted Feature Approach to Detect Malicious Tweets.- Web Scams Detection System.- Vulnerabilities and Exploits .- VulMAE: Graph Masked Autoencoders for Vulnerability Detection from Source and Binary Codes.
- Analysis of Cryptographic CVEs: Lessons Learned and Perspectives.- A BERT-Based Framework for Automated Extraction of Indicators of Compromise from Security Incident Reports.- Enhancing Code Security Through Open-source Large Language Models: A Comparative Study.- Network and System Threat .- Green-Fuzz: Efficient Fuzzing for Network Protocol Implementations.- Unmasking of Maskware: Detection and Prevention of Next-Generation Mobile Crypto-Ransomware.- Automated Attacker Behaviour Classification Using Threat Intelligence Insights.- UDP state manipulation: description of a Packet Filtering vulnerability in Stateful firewalls.
- Malware Analysis .- Following the Obfuscation Trail: Identifying and Exploiting Obfuscation Signatures in Malicious Code.- On Exploiting Symbolic Execution to Improve the Analysis of RAT Samples with angr.- Original Entry Point detection based on graph similarity.- Attacking and Securing the Clock Randomization and Duplication Side-Channel Attack Countermeasure.- Security Design .- Hardening Systems Against Data Corruption Attacks at Design Time.- Design of an Efficient Distributed Delivery Service for Group Key Agreement Protocols.
- A shared key recovery attack on a masked implementation of CRYSTALS-Kyber's encapsulation algorithm.- Tight Differential Privacy Guarantees for the Shuffle Model with k-Randomized Response.