Now showing items 1-4 of 4
Source-Free, Component-Driven Software Security Hardening
Hardening COTS binary software products (e.g., via control-flow integrity (CFI) and/or software fault isolation (SFI) defenses) is extremely complex in contexts where the surrounding software environment includes ...
Mitigating Cyberattack with Machine Learning-Based Feature Space Transforms
With the increase in attacks on software systems, there is a need for a new approach in software defense. In this work, we explore machine learning-based approaches for the detection and mitigation of attacks. A machine ...
Privacy Enhancing Cryptographic Constructs for Cloud and Distributed Security
Despite commanding a significant market cap, the cloud is still not trusted with sensitive data due to security and privacy concerns. Secrecy of the data can be ensured by using a provably secure encryption scheme, but ...
Using Machine Learning Techniques for Prediction and Data Generation with Applications to Data Privacy
Increasingly, machine learning (ML) applications are developed and become an integral part of many real-world applications. Especially, ML techniques are heavily used in research and industry to help make effective ...