Filters








95 Hits in 6.4 sec

Textual Backdoor Attacks Can Be More Harmful via Two Simple Tricks [article]

Yangyi Chen, Fanchao Qi, Zhiyuan Liu, Maosong Sun
2021 arXiv   pre-print
Current textual backdoor attacks have poor attack performance in some tough situations. In this paper, we find two simple tricks that can make existing textual backdoor attacks much more harmful.  ...  Experimental results show that the two tricks can significantly improve attack performance. This paper exhibits the great potential harmfulness of backdoor attacks.  ...  This paper shows that textual backdoor attacks can be even more insidious and harmful easily. We hope more people can notice the serious threat of backdoor attacks.  ... 
arXiv:2110.08247v1 fatcat:fevl3baaefhflnmnnpcyrapnju

Text Adversarial Attacks and Defenses: Issues, Taxonomy, and Perspectives

Xu Han, Ying Zhang, Wei Wang, Bin Wang, Yanhui Guo
2022 Security and Communication Networks  
In this work, we provide a comprehensive overview of adversarial attacks and defenses in the textual domain.  ...  However, unlike the image, the text is discrete and semantic in nature, making the generation of adversarial attacks even more difficult.  ...  Our survey has the following findings: (1) e Trends of Text Adversarial Attacks. Adversarial examples are essentially data, which can be used for backdoor attacks, testing robustness, or defense.  ... 
doi:10.1155/2022/6458488 fatcat:eprramkfkvdofm6opvjksasg2q

Tools and Techniques for Malware Detection and Analysis [article]

Sajedul Talukder
2020 arXiv   pre-print
The behavioral patterns obtained either statically or dynamically can be exploited to detect and classify unknown malware into their known families using machine learning techniques.  ...  Malicious software, often referred to as a malware that are designed by attackers are polymorphic and metamorphic in nature which have the capability to change their code as they spread.  ...  This can be helpful in detecting malicious content and also in finding false positives -regular and harmless objects identified as dangerous by one or more scanners. SysAnalyzer.  ... 
arXiv:2002.06819v2 fatcat:mekiawuu4fgzdedjthtq3v44hm

A Roadmap for Big Model [article]

Sha Yuan, Hanyu Zhao, Shuai Zhao, Jiahong Leng, Yangxiao Liang, Xiaozhi Wang, Jifan Yu, Xin Lv, Zhou Shao, Jiaao He, Yankai Lin, Xu Han (+88 others)
2022 arXiv   pre-print
At the end of this paper, we conclude the further development of BMs in a more general view.  ...  Backdoor attacks can also be deployed in the physical world, which could pose more realistic threats to practical ML services. [1010] first demonstrate physical backdoor attacks on face recognition.  ...  Recently, [1030] find that natural image transformations can significantly affect the performance of backdoor attacks, indicating that the simple transformations can be used as effective pre-processing  ... 
arXiv:2203.14101v4 fatcat:rdikzudoezak5b36cf6hhne5u4

A Survey on Recent Advanced Research of CPS Security

Zhenhua Wang, Wei Xie, Baosheng Wang, Jing Tao, Enze Wang
2021 Applied Sciences  
Malicious attacks on CPSs can lead to both property damage and casualties. Therefore, it is worth surveying CPS security by reviewing and analyzing the latest high-quality related works.  ...  dimensions: (1) architecture layers (perception, network, and application); (2) application scenarios (smart grids, health care, smart transportation, smart homes, and general grids); and (3) MADC (Measure, Attack  ...  More authentication methods can be used in CPS, but they also provide a broader attack surface for attackers.  ... 
doi:10.3390/app11093751 fatcat:fxby2wjzpnchrfshvilxalmptm

Alexa Lied to Me

Richard Mitev, Markus Miettinen, Ahmad-Reza Sadeghi
2019 Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security - Asia CCS '19  
In this paper, we show that specially crafted malicious Skills can use the seemingly limited Skill interaction model to cause harm.  ...  Capabilities of virtual assistants can be enhanced with so-called Skills, i.e., programmatic extensions that allow thirdparty providers to integrate their services with the respective voice assistant.  ...  that can be used to construct harmful attacks against users by utilizing compromised IoT devices in the vicinity of the Alexa device for realizing the attack.  ... 
doi:10.1145/3321705.3329842 dblp:conf/ccs/MitevMS19 fatcat:vut7hf435vaylfmxhn4muixfs4

Implementation of SNS Model for Intrusion Prevention in Wireless Local Area Network [article]

Abdullahi Isah
2015 Ph.d.-serien for Det Teknisk-Naturvidenskabelige Fakultet, Aalborg Universitet  
Intrusion can be presented if the source of an attack can be trace.  ...  As can be seen in the bar graph, the performances of the two groups is almost similar.  ... 
doi:10.5278/vbn.phd.engsci.00017 fatcat:dqz324xtjbgy3jjyameuc2z3ii

Adversarial Machine Learning in Text Processing: A Literature Survey

Izzat Alsmadi, Nura Aljaafari, Mahmoud Nazzal, Shadan Alhamed, Ahmad H. Sawalmeh, Conrado P. Vizcarra, Abdallah Khreishah, Muhammad Anan, Abdulelah Algosaibi, Mohammed Abdulaziz Al-Naeem, Adel Aldalbahi, Abdulaziz Al-Humam
2022 IEEE Access  
Text created by machine learning algorithms has many types of applications, some of which can be considered malicious especially if there is an intention to present machine-generated text as human-generated  ...  Thus, each problem can have its own challenges.  ...  After generating adversarial examples, they can be used in two main forms of attack settings: black-box and white-box attacks.  ... 
doi:10.1109/access.2022.3146405 fatcat:emahpmjqmnbjpbhptrrtrjlja4

Cybersecurity in Robotics: Challenges, Quantitative Modeling, and Practice [article]

Quanyan Zhu, Stefan Rass, Bernhard Dieber, Victor Mayoral Vilches
2021 arXiv   pre-print
This book aims to stipulate the inclusion of security in robotics from the earliest design phases onward and with a special focus on the cost-benefit tradeoff that can otherwise be an inhibitor for the  ...  Robotics is becoming more and more ubiquitous, but the pressure to bring systems to market occasionally goes at the cost of neglecting security mechanisms during the development, deployment or while in  ...  These and many more attacks can easily be implemented using simple constructs that make use of 3.1.  ... 
arXiv:2103.05789v4 fatcat:p3inkof6kbh3rds6jigvmq4doe

Automated State Machines Applied in Client Honeypots

Yaser Alosefer, Omer Rana
2010 2010 5th International Conference on Future Information Technology  
The shell code can do much more than just open a backdoor; it can also install malicious code on the victim's machine, such as a virus or rootkit.  ...  Many studies have used and extended this method as it shows attacks in a simple way. Most malware can be presented using this method.  ... 
doi:10.1109/futuretech.2010.5482695 fatcat:n6xgujmyeng6lmqgqwoou52cfy

Evaluation des systèmes de détection d'intrusions

-Anas -ABOU EL KALAM
2006 Revue de l Electricité et de l Electronique  
in http request where simple textual fields are expected.  ...  An attack can be carried via the network and needs no direct intervention on the local machine.  ...  Benchmarking Is a specific kind of test; it is the process of comparing the performance of two or more systems by measurements.  ... 
doi:10.3845/ree.2006.102 fatcat:erwecavq3zh33o3b5aemi5q5gm

An Equivalence Between Data Poisoning and Byzantine Gradient Attacks [article]

Sadegh Farhadkhani, Rachid Guerraoui, Lê-Nguyên Hoang, Oscar Villemaud
2022 arXiv   pre-print
More specifically, we prove that every gradient attack can be reduced to data poisoning, in any personalized federated learning system with PAC guarantees (which we show are both desirable and realistic  ...  Moreover, using our equivalence, we derive a practical attack that we show (theoretically and empirically) can be very effective against classical personalized federated learning models.  ...  More precisely, we show how any (converging) gradient attack can be turned into a data poisoning attack, with equal harm.  ... 
arXiv:2202.08578v2 fatcat:i2hpyudszjhanbu2syiskqyzky

Cyber Attacks and the Laws of War

Michael Gervais
2011 Social Science Research Network  
Rather, the innumerable harmful effects caused by cyber attacks makes their categorization both more complex and more necessary.  ...  Further, a discrete cyber attack can cause unnecessary suffering because it does not arouse suspicion and therefore leads to excessive harm.  ... 
doi:10.2139/ssrn.1939615 fatcat:sszxgfgpjfeibhuyjnj5sruowe

Bluetooth Hacking: A Case Study

Dennis Browning, Gary Kessler
2009 Journal of Digital Forensics, Security and Law  
This kind of an attack can be very harmful to a phone (E-Stealth, 2008; Laurie et al., 2006) .  ...  E-Stealth (2008) and Laurie et al. (2006) offer information about a wide range of attacks that can be launched via Bluetooth vulnerabilities.  ... 
doi:10.15394/jdfsl.2009.1058 fatcat:cm7mvnadpzdthhitft5boixn5i

Intrusion-Detection Systems [chapter]

Peng Ning, Sushil Jajodia
2012 Handbook of Computer Networks  
detailed background information than can be accommodated in shorter survey articles.  ...  Song, and Douglas Maughan; ISBN: 978-0-387-32720-4 Bleumer; ISBN: 978-0-387-29313-2 Additional information about this series can be obtained from http://www.springer.com The goals of the Springer International  ...  be seen at http://www.netqos.eu/).  ... 
doi:10.1002/9781118256107.ch26 fatcat:aeidzkegvfc27dqqmztiayv3dm
« Previous Showing results 1 — 15 out of 95 results