Cyber Security Lab
Current Research Topics
Lab Research Team
Securing keystrokes:
-
Securing keystroke dynamics from replay attacks
-
Keystroke dynamics obfuscation using key grouping
Black-box end-to-end attacks/security
-
Defense methods against adversarial examples for recurrent neural networks
-
Low resource black-box end-to-end attack against state of the art API call based malware classifiers
-
Generic black-box end-to-end attack against rnns and other api calls based malware classifiers
-
Query-efficient gan based black-box attack against sequence based machine and deep learning classifiers
-
Query-Efficient Black-Box Attack Against Sequence-Based Malware Classifiers
Effective Database Activity Monitoring:
-
Using Bandits for Effective Database Activity Monitoring
-
Diversifying database activity monitoring with bandits
-
Simulating user activity for assessing effect of sampling on DB activity monitoring anomaly detection
-
Sampling high throughput data for anomaly detection of data-base activity
-
CyberRank: knowledge elicitation for risk assessment of database security