Skip to main content

Showing 1–5 of 5 results for author: Preuveneers, D

Searching in archive cs. Search in all archives.
.
  1. arXiv:2402.19027  [pdf, other

    cs.CR cs.AI

    How to Train your Antivirus: RL-based Hardening through the Problem-Space

    Authors: Jacopo Cortellazzi, Ilias Tsingenopoulos, Branislav Bošanský, Simone Aonzo, Davy Preuveneers, Wouter Joosen, Fabio Pierazzi, Lorenzo Cavallaro

    Abstract: ML-based malware detection on dynamic analysis reports is vulnerable to both evasion and spurious correlations. In this work, we investigate a specific ML architecture employed in the pipeline of a widely-known commercial antivirus company, with the goal to harden it against adversarial malware. Adversarial training, the sole defensive technique that can confer empirical robustness, is not applica… ▽ More

    Submitted 29 February, 2024; originally announced February 2024.

    Comments: 20 pages,4 figures

  2. arXiv:2312.13435  [pdf, other

    cs.AI cs.CR

    Adversarial Markov Games: On Adaptive Decision-Based Attacks and Defenses

    Authors: Ilias Tsingenopoulos, Vera Rimmer, Davy Preuveneers, Fabio Pierazzi, Lorenzo Cavallaro, Wouter Joosen

    Abstract: Despite considerable efforts on making them robust, real-world ML-based systems remain vulnerable to decision based attacks, as definitive proofs of their operational robustness have so far proven intractable. The canonical approach in robustness evaluation calls for adaptive attacks, that is with complete knowledge of the defense and tailored to bypass it. In this study, we introduce a more expan… ▽ More

    Submitted 20 December, 2023; originally announced December 2023.

  3. arXiv:2002.02806  [pdf

    cs.DC

    A Comprehensive Feature Comparison Study of Open-Source Container Orchestration Frameworks

    Authors: Eddy Truyen, Dimitri Van Landuyt, Davy Preuveneers, Bert Lagaisse, Wouter Joosen

    Abstract: (1) Background: Container orchestration frameworks provide support for management of complex distributed applications. Different frameworks have emerged only recently, and they have been in constant evolution as new features are being introduced. This reality makes it difficult for practitioners and researchers to maintain a clear view of the technology space. (2) Methods: we present a descriptive… ▽ More

    Submitted 5 March, 2021; v1 submitted 7 February, 2020; originally announced February 2020.

    Comments: Technical report

  4. arXiv:1802.07233  [pdf, other

    cs.CR

    Frictionless Authentication Systems: Emerging Trends, Research Challenges and Opportunities

    Authors: Tim Van hamme, Vera Rimmer, Davy Preuveneers, Wouter Joosen, Mustafa A. Mustafa, Aysajan Abidin, Enrique Argones Rúa

    Abstract: Authentication and authorization are critical security layers to protect a wide range of online systems, services and content. However, the increased prevalence of wearable and mobile devices, the expectations of a frictionless experience and the diverse user environments will challenge the way users are authenticated. Consumers demand secure and privacy-aware access from any device, whenever and… ▽ More

    Submitted 20 February, 2018; originally announced February 2018.

    Comments: published at the 11th International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2017)

  5. Automated Website Fingerprinting through Deep Learning

    Authors: Vera Rimmer, Davy Preuveneers, Marc Juarez, Tom Van Goethem, Wouter Joosen

    Abstract: Several studies have shown that the network traffic that is generated by a visit to a website over Tor reveals information specific to the website through the timing and sizes of network packets. By capturing traffic traces between users and their Tor entry guard, a network eavesdropper can leverage this meta-data to reveal which website Tor users are visiting. The success of such attacks heavily… ▽ More

    Submitted 5 December, 2017; v1 submitted 21 August, 2017; originally announced August 2017.

    Comments: To appear in the 25th Symposium on Network and Distributed System Security (NDSS 2018)