CAMLIS
Keynote Panel
28:48
CAMLIS
AdapterSwap: Continuous Training of LLMs with Data Removal and Access-Control Guarantees
29:11
CAMLIS
Defending Large Language Models Against Attacks With Residual Stream Activation Analysis
23:33
CAMLIS
LLM Backdoor Activations Stick Together
20:40
CAMLIS
Curl: Private LLMs through Wavelet-Encoded Look-Up Tables
19:49
CAMLIS
Hamm-Grams: Mining Common Regular Expressions via Locality Sensitive Hashing
19:12
CAMLIS
Let’s Make it Personal: Customizing Threat Intelligence with Metric Learning
25:39
CAMLIS
Defending Against Indirect Prompt Injection Attacks With Spotlighting
26:16
CAMLIS
Keynote - Acting to Ensure AI Benefits Cyber Defense in a Decade of Technological Surprise
1:07:59
CAMLIS
Is F1 Score Suboptimal for Cybersecurity Models? Introducing Cscore
28:15
CAMLIS
Structure and Semantics-Aware Malware Classification with Vision Transformers
28:24
CAMLIS
PEVuln: A Benchmark Dataset for Using Machine Learning to Detect Vulnerabilities in PE Malware
14:58
CAMLIS
DIP-ECOD: Improving Anomaly Detection in Multimodal Distributions
21:05
CAMLIS
LLM Agents for Vulnerability Identification and Verification of CVEs
31:58
CAMLIS
End-to-End Framework using LLMs for Technique Identification and Threat-Actor Attribution
29:34
CAMLIS
Towards Autonomous Cyber-Defence: Using Co-Operative Decision Making for Cybersecurity
26:07
CAMLIS
PyRIT: A Framework for Security Risk Identification and Red Teaming in Generative AI Systems
20:33
CAMLIS
Cybersecurity and Infrastructure Security Agency (CISA)
52:00
CAMLIS
Graph-Based User-Entity Behavior Analytics for Enterprise Insider Threat Detection
26:47
CAMLIS
Don’t you forget NLP: prompt injection using repeated sequences in ChatGPT
26:34
CAMLIS
Playing Defense: Benchmarking Cybersecurity Capabilities of Large Language Models
28:11
CAMLIS
LLM Prompt Injection: Attacks and Defenses
22:00
CAMLIS
Model Leeching: An Extraction Attack Targeting LLMs
28:09
CAMLIS
Anomaly Detection of Command Shell Sessions based on DistilBERT: Unsupervised and Supervised Appro
17:51
CAMLIS
Razing to the Ground Machine Learning Phishing Webpage Detectors with Query Efficient Adversarial HT
25:51
CAMLIS
Web content filtering through knowledge distillation of Large Language Models
20:30
CAMLIS
Compilation as a Defense: Enhancing DL Model Attack Robustness via Tensor Optimization
23:35
CAMLIS
Multi-Agent Reinforcement Learning for Maritime Operational Technology Cyber Security
25:25
CAMLIS
Enhancing Exfiltration Path Analysis Using Reinforcement Learning
25:49
CAMLIS
Keynote - Security Issues in Generative AI
1:11:02
CAMLIS
MalDICT: Benchmark Datasets on Malware Behaviors, Platforms, Exploitation, and Packers
25:23
CAMLIS
Keynote - Lessons for AI Security Preparedness
1:07:58
CAMLIS
Adaptive Experimental Design for Intrusion Data Collection
25:59
CAMLIS
Proxy in a Haystack: Uncovering and Classifying MFA Bypass Phishing Attacks in Large Scale Authenti
24:17
CAMLIS
Small Effect Sizes in Malware Detection? Make Harder Train:Test Splits!
24:25
CAMLIS
SQL Driven Infrastructure for Cybersecurity ML Operations
25:54
CAMLIS
FASER: Binary Code Similarity Search through the use of Intermediate Representations
23:57
CAMLIS
Threat Detection on Kubernetes Logs Using GNN Embeddings
27:11
CAMLIS
Building a Multi-Tenant Machine Learning Workflow Orchestration Platform (CAMLIS 2022)
17:12
CAMLIS
OmnibusCyber: a schema-ready strongly typed database to model all cyber security objects
14:41
CAMLIS
Inroads in Autonomous Network Defence using Explained Reinforcement Learning (CAMLIS 2022)
19:19
CAMLIS
Enhancing 2FA with IP-based geolocation without blocking all your users (CAMLIS 2022)
11:42
CAMLIS
Playing Cat and Mouse with the Attacker: Frequent Item Set Mining in the Registry (CAMLIS 2022)
20:06
CAMLIS
Firenze: Model Evaluation Using Weak Signals (CAMLIS 2022)
19:59
CAMLIS
Keys to the Digital Castle: Detecting Malicious MDA Device Enrollment at Scale (CAMLIS 2022)
8:43
CAMLIS
Temporal Attack Detection in Multimodal Cyber-Physical Systems with Sticky HDP-HMM (CAMLIS 2022)
11:39
CAMLIS
Keynote: Lessons Learned in Red Teaming AI Systems in High-Stakes Environments (CAMLIS 2022)
36:48
CAMLIS
Half-Day Vulnerabilities: A Study of the First Days of CVE Entries (CAMLIS 2022)
21:38
CAMLIS
An Explainable Framework for Predicting Vulnerability Threat Using Topic and Threat Modeling
18:29
CAMLIS
ARNIE: Hasta La Vector, Baby! Towards Better Encoding and Vectorization of Cyber Artifacts
26:16
CAMLIS
Network Security Modelling with Distributional Data (CAMLIS 2022)
19:30
CAMLIS
Detecting Homoglyph Domains with Character Image LSTMs (CAMLIS 2022)
16:44
CAMLIS
Learning to Embed Byte Sequences with Convolutional Autoencoders (CAMLIS 2022)
20:50
CAMLIS
Keynote: PE Binary Classification Pitfalls (CAMLIS 2022)
38:25
CAMLIS
Heterogenous Graph Embedding for Malicious Azure Sign-in Detection (CAMLIS 2022)
17:01
CAMLIS
Webshell Detection Case Study (CAMLIS 2022)
22:49
CAMLIS
Minimizing Compute Costs: When When Should We Run More Expensive Malware Analysis? (CAMLIS 2022)
22:03
CAMLIS
Efficient Malware Analysis Using Metric Embeddings (CAMLIS 2022)
19:25
CAMLIS
TweetSeeker: Extracting Adversary Methods from the Twitterverse
30:34
CAMLIS
Next Generation Process Emulation with Binee
29:09
CAMLIS
Using Lexical Features for Malicious URL Detection- A Machine Learning Approach
19:10
CAMLIS
EMBER Improvements
27:21
CAMLIS
An Information Security Approach to Feature Engineering
15:10
CAMLIS
Learning to Rank Relevant Malware Strings Using Weak Supervision
26:56
CAMLIS
On Evaluating Adversarial Robustness
50:32
CAMLIS
Scalable Infrastructure for Malware Labeling and Analysis
32:27
CAMLIS
Mitigating Adversarial Attacks against Machine Learning for Static Analysis
26:40
CAMLIS
Towards a Trustworthy and Resilient Machine Learning Classifier - a Case Study of Ransomware Behavio
26:44
CAMLIS
Exploring Backdoor Poisoning Attacks Against Malware Classifiers
29:03
CAMLIS
Trying to Make Meterpreter into an Adversarial Example
28:16
CAMLIS
Applying Deep Graph Representation Learning to the Malware Graph
32:19
CAMLIS
Applications of Graph Integration to Function Comparison and Malware Classification
31:06
CAMLIS
What is the Shape of an Executable?
21:26
CAMLIS
ProblemChild: Discovering Anomalous Patterns based on Parent-Child Process Relationships
29:42
CAMLIS
Describing Malware via Tagging
31:13
CAMLIS
Protecting Users: When Security and Privacy Collide
34:37
CAMLIS
Improved Multi-Stage Classification for Information Security Applications
28:37
CAMLIS
Automated in-memory malware/rootkit detection via binary analysis and machine learning
27:06
CAMLIS
TreeHuggr: Discovering where tree-based classifiers are vulnerable to adversarial attack
27:10
CAMLIS
Estimating uncertainty for binary classifiers
30:56
CAMLIS
Using Anomaly Detection on User Demographic Distributions to Identify Fake Account Bursts
29:23
CAMLIS
Point process modeling of temporal patterns in user authentication behavior
30:27
CAMLIS
Some Mistakes are More Mistaken Than Others: Using Cost-Matrix Clustering to Address Misclassificati
29:56
CAMLIS
Do You Know What Your ML Is Doing?
44:26
CAMLIS
Interpretation of Threat Prediction Model for SOC Analysts
28:32
CAMLIS
Measure Twice, Quarantine Once: A Tale of Malware Labeling over Time
27:40
CAMLIS
An Effective Framework for Malware Detection and Classification using Feature Prioritization
19:43
CAMLIS
Activation Analysis of a Byte-based Deep Neural Network for Malware Classification
30:07
CAMLIS
Labeling Red: Harvesting Labeled Data from Adversary Simulations
32:44
CAMLIS
Worm2Vec: Embedding Malicious Code for Efficient Clustering & Classification
28:56
CAMLIS
Datasets for the Everyman
26:03
CAMLIS
Serverless Data Processing Architecture for Binary Analysis
21:37
CAMLIS
Inferring Model Families from Deployed Black Boxes
28:56
CAMLIS
APTinder: An optimized approach for finding that perfect APT match
28:36
CAMLIS
A feature presentation: semi-supervised learning of file representations
27:29
CAMLIS
Anticipatory Cyber Defense via Predictive Analytics, Machines Learning and Simulation
29:35
CAMLIS
Bonware to the Rescue: the Future Autonomous Cyber Defense Agents | Dr Alexander Kott | CAMLIS 2018
44:41