Evasion is not enough: A case study of android malware H Berger, C Hajaj, A Dvir International Symposium on Cyber Security Cryptography and Machine Learning …, 2020 | 14 | 2020 |
Crystal ball: From innovative attacks to attack effectiveness classifier H Berger, C Hajaj, E Mariconti, A Dvir IEEE Access 10, 1317-1333, 2021 | 11* | 2021 |
A wrinkle in time: a case study in DNS poisoning H Berger, AZ Dvir, M Geva International Journal of Information Security 20, 313-329, 2021 | 11 | 2021 |
Do you think you can hold me? the real challenge of problem-space evasion attacks H Berger, A Dvir, C Hajaj, R Ronen arXiv preprint arXiv:2205.04293, 2022 | 2 | 2022 |
Stableyolo: Optimizing image generation for large language models H Berger, A Dakhama, Z Ding, K Even-Mendoza, D Kelly, H Menendez, ... International Symposium on Search Based Software Engineering, 133-139, 2023 | 1 | 2023 |
Breaking the structure of MaMaDroid H Berger, A Dvir, E Mariconti, C Hajaj Expert Systems with Applications 228, 120429, 2023 | 1* | 2023 |
Problem-space evasion attacks in the Android OS: a survey H Berger, C Hajaj, A Dvir arXiv preprint arXiv:2205.14576, 2022 | 1 | 2022 |
Can you See me? On the Visibility of NOPs against Android Malware Detectors D Soi, D Maiorca, G Giacinto, H Berger arXiv preprint arXiv:2312.17356, 2023 | | 2023 |
A Production Suite for Failure Detectors J Dong, R Xin, H Berger, O Marin 2023 International Conference on Intelligent Computing and Next Generation …, 2023 | | 2023 |
Cadence: A Simulator for Human Movement-based Communication Protocols H Berger, M Sherr, A Aviv Proceedings of the 16th Cyber Security Experimentation and Test Workshop, 26-31, 2023 | | 2023 |
King’s Research Portal H Berger, A Dakhama, Z Ding, K Even-Mendoza, D Kelly, HD Menendez, ... | | |