Filters








800 Hits in 10.6 sec

Obfuscation Revealed: Leveraging Electromagnetic Signals for Obfuscated Malware Classification

Duy-Phuc Pham, Damien Marion, Matthieu Mastio, Annelie Heuser
2021 Annual Computer Security Applications Conference  
We will present a novel approach of using side channel information to identify the kinds of threats that are targeting the device.  ...  Using our approach, a malware analyst is able to obtain precise knowledge about malware type and identity, even in the presence of obfuscation techniques which may prevent static or symbolic binary analysis  ...  We thank our colleague Ronan Lashermes who provided hardware and side-channel insights that greatly assisted this work.  ... 
doi:10.1145/3485832.3485894 fatcat:tqzl6tvwffdvxftflyzzdcyp3u

Artificial Intelligence, Machine Learning and Deep Learning in Ion Channel Bioinformatics

Md. Ashrafuzzaman
2021 Membranes  
Focused research on ion channels and related findings over many decades accumulated huge data which may be utilized in a specialized scientific manner to fast conclude pinpointed aspects of channels.  ...  In these focused research areas, the use of artificial intelligence (AI), machine learning (ML), and deep learning (DL) algorithms and associated models have been found very popular.  ...  Large-scale potassium channel sequence analysis confirms the requirement of identifying the potassium channel α-subunit proteins [27] .  ... 
doi:10.3390/membranes11090672 pmid:34564489 fatcat:coprc5dm7bgfdmhudd55tmr7zm

Ultra-Low-Power Design and Hardware Security Using Emerging Technologies for Internet of Things

2017 Electronics  
The uses of emerging technologies and lightweight encryption for correlation power analysis against side channel attack, silicon nanowire polymorphic gates, and all-spin logic devices for deception and  ...  These include important encryption techniques, side channel attack/defense, logic locking/split manufacturing against reverse-engineering/counterfeiting, and camouflage layout.  ...  Acknowledgments: The authors wish to thank Yu Bi for his early contribution on silicon nanowire camouflage, KATAN light-weight encryption and correlation power analysis.  ... 
doi:10.3390/electronics6030067 fatcat:ozssarlb2ng5pcdsupo2hljyna

Trade-off between Transcriptome Plasticity and Genome Evolution in Cephalopods

Noa Liscovitch-Brauer, Shahar Alon, Hagit T. Porath, Boaz Elstein, Ron Unger, Tamar Ziv, Arie Admon, Erez Y. Levanon, Joshua J.C. Rosenthal, Eli Eisenberg
2017 Cell  
Due to the large number of sites, the surrounding conservation greatly reduces the number of mutations and genomic polymorphisms in protein coding regions.  ...  The genomic sequence flanking editing sites is highly conserved, suggesting that the process confers a selective advantage.  ...  alike, up to ~100nt on each side of a recoding site.  ... 
doi:10.1016/j.cell.2017.03.025 pmid:28388405 pmcid:PMC5499236 fatcat:ok5yr2ql2fbbvlti42zw5d2jve

Deep Learning in Information Security [article]

Stefan Thaler, Vlado Menkovski, Milan Petkovic
2018 arXiv   pre-print
Deep Learning is a sub-field of machine learning, which uses models that are composed of multiple layers.  ...  Based on an analysis of our reviewed papers, we point out shortcomings of DL-methods to those requirements and discuss further research opportunities.  ...  The execution traces are collected unobtrusively via a side channel by an inexpensive electromagnetic sensor.  ... 
arXiv:1809.04332v1 fatcat:xfb7lgrkw5cirdl3qvmg3ssnbi

Deep learning-level melanoma detection by interpretable machine learning and imaging biomarker cues

Daniel S. Gareau, James Browning, Joel Correa Da Rosa, Mayte Suarez-Farinas, Samantha Lish, Amanda M. Zong, Benjamin Firester, Charles Vrattos, Yael Renert-Yuval, Mauricio Gamboa, María G. Vallone, Zamira F. Barragán-Estudillo (+9 others)
2020 Journal of Biomedical Optics  
Deep machine learning approaches to image analysis offer promise but lack the transparency to be widely adopted as stand-alone diagnostics.  ...  We aimed to create a transparent machine learning technology (i.e., not deep learning) to discriminate melanomas from nevi in dermoscopy images and an interface for sensory cue integration.  ...  Acknowledgments The authors would like to acknowledge Sarah Yagerman, who was involved on the initial study (Ref.  ... 
doi:10.1117/1.jbo.25.11.112906 pmid:33247560 pmcid:PMC7702097 fatcat:6zs6qwprvjh5dcwhnxh36pjeai

Opportunities and obstacles for deep learning in biology and medicine

Travers Ching, Daniel S. Himmelstein, Brett K. Beaulieu-Jones, Alexandr A. Kalinin, Brian T. Do, Gregory P. Way, Enrico Ferrero, Paul-Michael Agapow, Michael Zietz, Michael M. Hoffman, Wei Xie, Gail L. Rosen (+24 others)
2018 Journal of the Royal Society Interface  
Deep learning describes a class of machine learning algorithms that are capable of combining raw inputs into layers of intermediate features.  ...  We examine applications of deep learning to a variety of biomedical problems-patient classification, fundamental biological processes and treatment of patients-and discuss whether deep learning will be  ...  We gratefully acknowledge Christof Angermueller, Kumardeep Chaudhary, Gö kcen Eraslan, Mikael Huss, Bharath Ramsundar and Xun Zhu for their discussion of the manuscript and reviewed papers on GitHub.  ... 
doi:10.1098/rsif.2017.0387 pmid:29618526 pmcid:PMC5938574 fatcat:65o4xmp53nc6zmj37srzuht6tq

DNA-graphene interactions during translocation through nanogaps

Hiral N. Patel, Ian Carroll, Rodolfo Lopez, Sandeep Sankararaman, Charles Etienne, Subba Ramaiah Kodigala, Mark R. Paul, Henk W.Ch. Postma, Yogendra Kumar Mishra
2017 PLoS ONE  
We study how double-stranded DNA translocates through graphene nanogaps. Nanogaps are fabricated with a novel capillary-force induced graphene nanogap formation technique.  ...  We also observe exponentially relaxing current traces. We suggest that slow relaxation of the graphene membrane following DNA translocation may be responsible.  ...  We thank Cees Dekker and Greg Schneider for useful discussions and their hospitality while helping us learn their wedge-transfer technique. Visualization: HWChP. Writing -original draft: HNP HWChP.  ... 
doi:10.1371/journal.pone.0171505 pmid:28158244 pmcid:PMC5291421 fatcat:afmk3tntdrejhel55334vcayiq

MBTree: Detecting Encryption RAT Communication Using Malicious Behavior Tree [article]

Cong Dong, Zhigang Lu, Zelin Cui, Baoxu Liu, Kai Chen
2020 arXiv   pre-print
These traces are reorganized in a sophisticated manner with other available datasets for a comprehensive assessment.  ...  A key challenge for cybersecurity defense is to detect the encrypted Remote Control Trojan (RAT) communication traces.  ...  The experiment results have shown the effectiveness of the combination of side-channel features and machine learning models. Besides, advanced deep learning models are also adopted in this area.  ... 
arXiv:2006.10196v2 fatcat:dt2cix5jvzepjaczzxhgd5nm7y

Tight Arms Race: Overview of Current Malware Threats and Trends in Their Detection

Luca Caviglione, Michal Choras, Igino Corona, Artur Janicki, Wojciech Mazurczyk, Marek Pawlicki, Katarzyna Wasielewska
2020 IEEE Access  
Next, we present the bird's eye view portraying the main development trends in detection methods with a special emphasis on the machine learning techniques.  ...  That is why, in this paper we first perform a detailed meta-review of the existing surveys related to malware and its detection techniques, showing an arms race between these two sides of a barricade.  ...  In a recent survey [14] , the authors reviewed some new dynamic analysis techniques (function call analysis, flow tracking, volatile memory forensics, and side-channel analysis, just to mention some)  ... 
doi:10.1109/access.2020.3048319 fatcat:tatdk6pzczgp3aylvbxoxabuta

Toward the End-to-End Optimization of Particle Physics Instruments with Differentiable Programming: a White Paper [article]

Tommaso Dorigo, Andrea Giammanco, Pietro Vischia, Max Aehle, Mateusz Bawaj, Alexey Boldyrev, Pablo de Castro Manzano, Denis Derkach, Julien Donini, Auralee Edelen, Federica Fanzago, Nicolas R. Gauger (+24 others)
2022 arXiv   pre-print
pipeline and the use of deep learning techniques may allow the simultaneous optimization of all design parameters.  ...  The full optimization of the design and operation of instruments whose functioning relies on the interaction of radiation with matter is a super-human task, given the large dimensionality of the space  ...  Acknowledgements We wish to thank all the participants of the first MODE workshop on differentiable programming that took place in Louvain-la-Neuve (Belgium) from 6 to 8 September 2021, for the fruitful  ... 
arXiv:2203.13818v1 fatcat:omwufbmervgjdmksu5scwld52q

Anti-VEGF Therapy for Neovascular AMD and Polypoidal Choroidal Vasculopathy

Gemmy Chui Ming Cheung, Timothy Y.Y. Lai, Fumi Gomi, Paisan Ruamviboonsuk, Adrian Koh, Won Ki Lee
2017 Asia-Pacific Journal of Ophthalmology  
Abstract: During the past decade, drugs that inhibit the actions of vascular endothelial growth factor (VEGF) have become standard-of-care treatment for a variety of chorioretinal vascular conditions.  ...  Importantly, 2 large multicenter randomized clinical trials evaluating the safety and efficacy of anti-VEGF monotherapy and combination with photodynamic therapy (PDT) have recently reported initial first-year  ...  The questionnaire difficulty was rated on a qualitative scale. Patients were asked to think aloud while providing their judgments.  ... 
doi:10.22608/apo.2017260 pmid:28971633 fatcat:ryihmagemzayzfemrdxfdwgkw4

Toward Engineering a Secure Android Ecosystem

Meng Xu, Chenxiong Qian, Sangho Lee, Taesoo Kim, Chengyu Song, Yang Ji, Ming-Wei Shih, Kangjie Lu, Cong Zheng, Ruian Duan, Yeongjin Jang, Byoungyoung Lee
2016 ACM Computing Surveys  
Based on our collection of knowledge, we envision a blueprint for engineering a secure, next-generation Android ecosystem.  ...  We organize the most recent security research on the Android platform into two categories: the software stack and the ecosystem.  ...  A general problem in the reseach of hardware-based side channels is the lack of end-to-end practical attack cases.  ... 
doi:10.1145/2963145 fatcat:d5vhxpdywrevvbh4as6vvt576q

Poster Session III-Wednesday

2013 Neuropsychopharmacology  
Although it is a highly heritable disease, a picture of the genetics is only now emerging from large-scale studies that is nowhere near complete.  ...  with the Apathy Evaluation Scale (AES), and depression with the Calgary Depression Scale for Schizophrenia (CDSS).  ...  This was an informatics analysis that did not involve the new use of mice or protocol approval. Twenty-three tract-tracing cases were selected that represented projections from multiple areas.  ... 
doi:10.1038/npp.2013.281 fatcat:n2o3tllrsrbyxgzsfwzhl5psua

Effects of errorless learning on the acquisition of velopharyngeal movement control

Andus Wing-Kuen Wong, Tara Whitehill, Estella Ma, Rich Masters
2012 Journal of the Acoustical Society of America  
A method for an optimal selection of frequencies in the smoothing process for the case of one reflection is presented, followed by formulations for smoothing in the more general case.  ...  Language learning and the developing brain: Cross-cultural studies unravel the effects of biology and culture.  ...  Noise and ASA Committee on Standards: Annoyance and Health Effects I 1aNSb1. A large scale study of the health effects of transportation noise in Hong Kong.  ... 
doi:10.1121/1.4708235 fatcat:7wzupz5u2nd6nc7ttvbpxwvunm
« Previous Showing results 1 — 15 out of 800 results