Picture for Lorenzo Cavallaro

Lorenzo Cavallaro

On the Lack of Robustness of Binary Function Similarity Systems

Add code
Dec 05, 2024
Viaarxiv icon

Context is the Key: Backdoor Attacks for In-Context Learning with Vision Transformers

Add code
Sep 06, 2024
Figure 1 for Context is the Key: Backdoor Attacks for In-Context Learning with Vision Transformers
Figure 2 for Context is the Key: Backdoor Attacks for In-Context Learning with Vision Transformers
Figure 3 for Context is the Key: Backdoor Attacks for In-Context Learning with Vision Transformers
Figure 4 for Context is the Key: Backdoor Attacks for In-Context Learning with Vision Transformers
Viaarxiv icon

How to Train your Antivirus: RL-based Hardening through the Problem-Space

Add code
Feb 29, 2024
Viaarxiv icon

Unraveling the Key of Machine Learning Solutions for Android Malware Detection

Add code
Feb 05, 2024
Figure 1 for Unraveling the Key of Machine Learning Solutions for Android Malware Detection
Figure 2 for Unraveling the Key of Machine Learning Solutions for Android Malware Detection
Figure 3 for Unraveling the Key of Machine Learning Solutions for Android Malware Detection
Figure 4 for Unraveling the Key of Machine Learning Solutions for Android Malware Detection
Viaarxiv icon

TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time (Extended Version)

Add code
Feb 02, 2024
Viaarxiv icon

Adversarial Markov Games: On Adaptive Decision-Based Attacks and Defenses

Add code
Dec 20, 2023
Viaarxiv icon

Locate and Verify: A Two-Stream Network for Improved Deepfake Detection

Add code
Sep 20, 2023
Viaarxiv icon

DFIL: Deepfake Incremental Learning by Exploiting Domain-invariant Forgery Clues

Add code
Sep 18, 2023
Viaarxiv icon

Symmetry-Preserving Program Representations for Learning Code Semantics

Add code
Aug 07, 2023
Viaarxiv icon

Jigsaw Puzzle: Selective Backdoor Attack to Subvert Malware Classifiers

Add code
Feb 11, 2022
Figure 1 for Jigsaw Puzzle: Selective Backdoor Attack to Subvert Malware Classifiers
Figure 2 for Jigsaw Puzzle: Selective Backdoor Attack to Subvert Malware Classifiers
Figure 3 for Jigsaw Puzzle: Selective Backdoor Attack to Subvert Malware Classifiers
Figure 4 for Jigsaw Puzzle: Selective Backdoor Attack to Subvert Malware Classifiers
Viaarxiv icon