Smart app attack: hacking deep learning models in android apps

Y Huang, C Chen - IEEE Transactions on Information Forensics …, 2022 - ieeexplore.ieee.org
On-device deep learning is rapidly gaining popularity in mobile applications. Compared to
offloading deep learning from smartphones to the cloud, on-device deep learning enables …

A P4-Based Adversarial Attack Mitigation on Machine Learning Models in Data Plane Devices

SS Reddy, K Nishoak, JL Shreya, YV Reddy… - Journal of Network and …, 2024 - Springer
In recent times, networks have been prone to several types of attacks, such as DDoS attacks,
volumetric attacks, replay attacks, eavesdropping, etc., which drastically degrade the …

Detection of induced false negatives in malware samples

A Wood, MN Johnstone - … on Privacy, Security and Trust (PST), 2021 - ieeexplore.ieee.org
Malware detection is an important area of cyber security. Computer systems rely on malware
detection applications to prevent malware attacks from succeeding. Malware detection is not …

Adversarial attacks against mouse-and keyboard-based biometric authentication: black-box versus domain-specific techniques

C López, J Solano, E Rivera, L Tengana… - International Journal of …, 2023 - Springer
Adversarial attacks have recently gained popularity due to their simplicity, impact, and
applicability to a wide range of machine learning scenarios. However, knowledge of a …

[HTML][HTML] TXAI-ADV: Trustworthy XAI for Defending AI Models against Adversarial Attacks in Realistic CIoT

S Ojo, M Krichen, MA Alamro, A Mihoub - Electronics, 2024 - mdpi.com
Adversarial attacks are more prevalent in Consumer Internet of Things (CIoT) devices (ie,
smart home devices, cameras, actuators, sensors, and micro-controllers) because of their …

Improving adversarial attacks against executable raw byte classifiers

J Burr, S Xu - IEEE INFOCOM 2021-IEEE Conference on …, 2021 - ieeexplore.ieee.org
Machine learning models serve as a powerful new technique for detecting malware.
However, they are extremely vulnerable to attacks using adversarial examples. Machine …

A study on robustness of malware detection model

W Zheng, K Omote - Annals of Telecommunications, 2022 - Springer
In recent years, machine learning–based techniques are used to prevent cyberattacks
caused by malware, and special attention is paid to the risks posed by such systems …

{USBESAFE}: An {End-Point} Solution to Protect Against {USB-Based} Attacks

A Kharraz, BL Daley, GZ Baker, W Robertson… - … on Research in Attacks …, 2019 - usenix.org
Targeted attacks via transient devices are not new. How-ever, the introduction of BadUSB
attacks has shifted the attack paradigm tremendously. Such attacks embed malicious code …

Malboard: A novel user keystroke impersonation attack and trusted detection framework based on side-channel analysis

N Farhi, N Nissim, Y Elovici - Computers & Security, 2019 - Elsevier
Concealing malicious components within widely used USB peripherals has become a
popular attack vector utilizing social engineering techniques and exploiting users' trust in …

Data sanitization approach to mitigate clean-label attacks against malware detection systems

S Ho, A Reddy, S Venkatesan… - MILCOM 2022-2022 …, 2022 - ieeexplore.ieee.org
Machine learning (ML) models are increasingly being used in the development of Malware
Detection Systems. Existing research in this area primarily focuses on developing new …