Picture for Lorenzo Cavallaro

Lorenzo Cavallaro

Retrofit: Continual Learning with Bounded Forgetting for Security Applications

Add code
Nov 14, 2025
Figure 1 for Retrofit: Continual Learning with Bounded Forgetting for Security Applications
Figure 2 for Retrofit: Continual Learning with Bounded Forgetting for Security Applications
Figure 3 for Retrofit: Continual Learning with Bounded Forgetting for Security Applications
Figure 4 for Retrofit: Continual Learning with Bounded Forgetting for Security Applications
Viaarxiv icon

Beyond Classification: Evaluating LLMs for Fine-Grained Automatic Malware Behavior Auditing

Add code
Sep 17, 2025
Figure 1 for Beyond Classification: Evaluating LLMs for Fine-Grained Automatic Malware Behavior Auditing
Figure 2 for Beyond Classification: Evaluating LLMs for Fine-Grained Automatic Malware Behavior Auditing
Figure 3 for Beyond Classification: Evaluating LLMs for Fine-Grained Automatic Malware Behavior Auditing
Figure 4 for Beyond Classification: Evaluating LLMs for Fine-Grained Automatic Malware Behavior Auditing
Viaarxiv icon

Aurora: Are Android Malware Classifiers Reliable under Distribution Shift?

Add code
May 28, 2025
Viaarxiv icon

On the Security Risks of ML-based Malware Detection Systems: A Survey

Add code
May 16, 2025
Viaarxiv icon

On Benchmarking Code LLMs for Android Malware Analysis

Add code
Apr 01, 2025
Viaarxiv icon

LAMD: Context-driven Android Malware Detection and Classification with LLMs

Add code
Feb 18, 2025
Figure 1 for LAMD: Context-driven Android Malware Detection and Classification with LLMs
Figure 2 for LAMD: Context-driven Android Malware Detection and Classification with LLMs
Figure 3 for LAMD: Context-driven Android Malware Detection and Classification with LLMs
Figure 4 for LAMD: Context-driven Android Malware Detection and Classification with LLMs
Viaarxiv icon

Learning Temporal Invariance in Android Malware Detectors

Add code
Feb 07, 2025
Figure 1 for Learning Temporal Invariance in Android Malware Detectors
Figure 2 for Learning Temporal Invariance in Android Malware Detectors
Figure 3 for Learning Temporal Invariance in Android Malware Detectors
Figure 4 for Learning Temporal Invariance in Android Malware Detectors
Viaarxiv icon

Defending against Adversarial Malware Attacks on ML-based Android Malware Detection Systems

Add code
Jan 23, 2025
Figure 1 for Defending against Adversarial Malware Attacks on ML-based Android Malware Detection Systems
Figure 2 for Defending against Adversarial Malware Attacks on ML-based Android Malware Detection Systems
Figure 3 for Defending against Adversarial Malware Attacks on ML-based Android Malware Detection Systems
Figure 4 for Defending against Adversarial Malware Attacks on ML-based Android Malware Detection Systems
Viaarxiv icon

On the Lack of Robustness of Binary Function Similarity Systems

Add code
Dec 05, 2024
Viaarxiv icon

Context is the Key: Backdoor Attacks for In-Context Learning with Vision Transformers

Add code
Sep 06, 2024
Figure 1 for Context is the Key: Backdoor Attacks for In-Context Learning with Vision Transformers
Figure 2 for Context is the Key: Backdoor Attacks for In-Context Learning with Vision Transformers
Figure 3 for Context is the Key: Backdoor Attacks for In-Context Learning with Vision Transformers
Figure 4 for Context is the Key: Backdoor Attacks for In-Context Learning with Vision Transformers
Viaarxiv icon