Publications
Chosen filters:
Chosen filters:
Intelligent Malware Defenses KU Leuven
With rapidly evolving threat landscape surrounding malware, intelligent defenses based on machine learning are paramount. In this chapter, we review the literature proposed in the past decade and identify the state-of-the-art in various related research directions—malware detection, malware analysis, adversarial malware, and malware author attribution. We discuss challenges that emerge when machine learning is applied to malware. We also ...
Open-World Network Intrusion Detection KU Leuven
This chapter contributes to the ongoing discussion of strengthening security by applying AI techniques in the scope of intrusion detection. The focus is set on open-world detection of attacks through data-driven network traffic analysis. This research topic is complementary to the earlier chapter on intelligent malware detection. In this chapter, we revisit the foundations of machine learning-based solutions for network security, which aim to ...
AI for Biometric Authentication Systems KU Leuven
Biometric authentication is currently one of the most attractive authentication methodologies, as it is very user friendly and is the most secure option for consumer grade mobile device authentication. Furthermore, biometric authentication can provide unique security properties, as it is the only authentication factor that is hard to share or steal. Machine learning has further advanced biometric authentication performance and helps detect well ...
Machine Learning Meets Data Modification KU Leuven
We explore how data modification can enhance privacy by examining the connection between data modification and machine learning. Specifically, machine learning “meets” data modification in two ways. First, data modification can protect the data that is used to train machine learning models focusing it on the intended use and inhibiting unwanted inference. Second, machine learning can provide new ways of creating modified data. In this chapter, ...
DeFIRED: decentralized authorization with receiver-revocable and refutable delegations KU Leuven
A lot of research has been done over the last few years regarding decentralized authorization and access control, with existing approaches like the WAVE framework removing the need to rely on centralized parties for the management of access policies. However, these solutions show shortcomings regarding revocations, by not allowing delegatees to revoke existing and decline incoming delegations. Therefore, in this paper, we present DeFIRED to ...