The success of machine learning (ML) has been accompanied by increased
c...
Code generation tools driven by artificial intelligence have recently be...
We propose FLARE, the first fingerprinting mechanism to verify whether a...
Today's blockchains suffer from low throughput and high latency, which
i...
Graph neural networks (GNNs) have emerged as a state-of-the-art approach...
Modern processors include high-performance cryptographic functionalities...
Nowadays, systems based on machine learning (ML) are widely used in diff...
We present Blinded Memory (BliMe), a way to realize efficient and secure...
Several advances in deep learning have been successfully applied to the
...
Hardware-assisted memory protection features are increasingly being depl...
In a data-driven world, datasets constitute a significant economic value...
Increasing the explainability of deep neural networks (DNNs) requires
ev...
Data used to train machine learning (ML) models can be sensitive. Member...
Recent work has discovered that deep reinforcement learning (DRL) polici...
Machine learning models are typically made available to potential client...
Detection of some types of toxic language is hampered by extreme scarcit...
Creators of machine learning models can use watermarking as a technique ...
Recently, machine learning (ML) has introduced advanced solutions to man...
Stack canaries remain a widely deployed defense against memory corruptio...
We investigate how an adversary can optimally use its query budget for
t...
Training machine learning (ML) models is expensive in terms of computati...
Stylometry can be used to profile authors based on their written text.
T...
Consensus mechanisms used by popular distributed ledgers are highly scal...
A popular run-time attack technique is to compromise the control-flow
in...
We present EAT2seq: a novel method to architect automatic linguistic
tra...
We present a novel method to architect automatic linguistic transformati...
Textual deception constitutes a major problem for online security. Many
...
Data-oriented attacks manipulate non-control data to alter a program's b...
Run-time attacks against programs written in memory-unsafe programming
l...
Function-as-a-Service (FaaS) is a recent and already very popular paradi...
With the spread of social networks and their unfortunate use for hate sp...
Secure firmware update is an important stage in the IoT device life-cycl...
As machine learning (ML) applications become increasingly prevalent,
pro...
Automatically generated fake restaurant reviews are a threat to online r...
Personal cryptographic keys are the foundation of many secure services, ...
IoT devices are being widely deployed. Many of them are vulnerable due t...
IoT devices are being widely deployed. Many of them are vulnerable due t...
Hardware-supported security mechanisms like Intel Software Guard Extensi...
Device proximity verification has a wide range of security applications ...
The security of billions of devices worldwide depends on the security an...
The need for flexible, low-overhead virtualization is evident on many fr...