Media Summary: Defending Against Data Reconstruction Attacks in Federated Exploring ChatGPT's Capabilities on Vulnerability Management Peiyu Liu and Junming Liu, Zhejiang University NGICS Platform; ... EaTVul: ChatGPT-based Evasion Attack Against Software Vulnerability Detection Shigang Liu, CSIRO's Data61 and Swinburne ...
Usenix Security 24 Inf2guard An Information Theoretic Framework For Learning - Detailed Analysis & Overview
Defending Against Data Reconstruction Attacks in Federated Exploring ChatGPT's Capabilities on Vulnerability Management Peiyu Liu and Junming Liu, Zhejiang University NGICS Platform; ... EaTVul: ChatGPT-based Evasion Attack Against Software Vulnerability Detection Shigang Liu, CSIRO's Data61 and Swinburne ... A Wolf in Sheep's Clothing: Practical Black-box Adversarial Attacks for Evading On Data Fabrication in Collaborative Vehicular Perception: Attacks and Countermeasures Qingzhao Zhang, Shuowei Jin, ... On Bridging the Gap between Control Flow Integrity and Attestation Schemes Mahmoud Ammar, Ahmed Abdelraoof, and Silviu ...
Rethinking the Invisible Protection against Unauthorized Image Usage in Stable Diffusion Shengwei An, Lu Yan, Siyuan Cheng, ... Page-Oriented Programming: Subverting Control-Flow Integrity of Commodity Operating System Kernels with Non-Writable Code ... A Linear Reconstruction Approach for Attribute Inference Attacks against Synthetic Data Meenatchi Sundaram Muthu Selva ... Your Firmware Has Arrived: A Study of Firmware Update Vulnerabilities Yuhao Wu, Jinwen Wang, Yujie Wang, Shixuan Zhai, and ... SAIN: Improving ICS Attack Detection Sensitivity via State-Aware Invariants Syed Ghazanfar Abbas, Muslum Ozgur Ozmen, ... Can Virtual Reality Protect Users from Keystroke Inference Attacks? Zhuolin Yang, Zain Sarwar, Iris Hwang, Ronik Bhaskar, Ben ...
Practical Data-Only Attack Generation Brian Johannesmeyer, Asia Slowinska, Herbert Bos, and Cristiano Giuffrida, Vrije ...