Authorship attribution for social media forensics

A Rocha, WJ Scheirer, CW Forstall… - IEEE transactions on …, 2016 - ieeexplore.ieee.org
The veil of anonymity provided by smartphones with pre-paid SIM cards, public Wi-Fi
hotspots, and distributed networks like Tor has drastically complicated the task of identifying …

Code authorship attribution: Methods and challenges

V Kalgutkar, R Kaur, H Gonzalez… - ACM Computing …, 2019 - dl.acm.org
Code authorship attribution is the process of identifying the author of a given code. With
increasing numbers of malware and advanced mutation techniques, the authors of malware …

Memguard: Defending against black-box membership inference attacks via adversarial examples

J Jia, A Salem, M Backes, Y Zhang… - Proceedings of the 2019 …, 2019 - dl.acm.org
In a membership inference attack, an attacker aims to infer whether a data sample is in a
target classifier's training dataset or not. Specifically, given a black-box access to the target …

Advanced persistent threats (apt): evolution, anatomy, attribution and countermeasures

A Sharma, BB Gupta, AK Singh… - Journal of Ambient …, 2023 - Springer
In today's cyber warfare realm, every stakeholder in cyberspace is becoming more potent by
developing advanced cyber weapons. They have equipped with the most advanced …

Debin: Predicting debug information in stripped binaries

J He, P Ivanov, P Tsankov, V Raychev… - Proceedings of the 2018 …, 2018 - dl.acm.org
We present a novel approach for predicting debug information in stripped binaries. Using
machine learning, we first train probabilistic models on thousands of non-stripped binaries …

Misleading authorship attribution of source code using adversarial learning

E Quiring, A Maier, K Rieck - 28th USENIX Security Symposium …, 2019 - usenix.org
In this paper, we present a novel attack against authorship attribution of source code. We
exploit that recent attribution methods rest on machine learning and thus can be deceived by …

Large-scale and language-oblivious code authorship identification

M Abuhamad, T AbuHmed, A Mohaisen… - Proceedings of the 2018 …, 2018 - dl.acm.org
Efficient extraction of code authorship attributes is key for successful identification. However,
the extraction of such attributes is very challenging, due to various programming language …

" Get in Researchers; We're Measuring Reproducibility": A Reproducibility Study of Machine Learning Papers in Tier 1 Security Conferences

D Olszewski, A Lu, C Stillman, K Warren… - Proceedings of the …, 2023 - dl.acm.org
Reproducibility is crucial to the advancement of science; it strengthens confidence in
seemingly contradictory results and expands the boundaries of known discoveries …

Source code authorship attribution using long short-term memory based networks

B Alsulami, E Dauber, R Harang, S Mancoridis… - … –ESORICS 2017: 22nd …, 2017 - Springer
Abstract Machine learning approaches to source code authorship attribution attempt to find
statistical regularities in human-generated source code that can identify the author or …

Unleashing the hidden power of compiler optimization on binary code difference: An empirical study

X Ren, M Ho, J Ming, Y Lei, L Li - Proceedings of the 42nd ACM …, 2021 - dl.acm.org
Hunting binary code difference without source code (ie, binary diffing) has compelling
applications in software security. Due to the high variability of binary code, existing solutions …