Web Application Firewalls are widely used in production environments to mitigate security threats like SQL injections. Many industrial products rely on signature-based techniques, but machine learning approaches are becoming more and more popular. The main goal of an adversary is to craft semantically malicious payloads to bypass the syntactic...
-
2020 (v1)PublicationUploaded on: March 27, 2023
-
2021 (v1)Publication
Tests, when not correctly implemented, can pass on incorrect system implementations rather than fail. In this case, they are named silent horrors or false-negative tests. They make releasing low-quality (buggy) versions of the software system more probable. Furthermore, faithfully implementing test specifications is crucial when they play the...
Uploaded on: April 14, 2023 -
2021 (v1)Publication
Recent work has shown that adversarial Windows malware samples - referred to as adversarial EXEmples in this article - can bypass machine learning-based detection relying on static code analysis by perturbing relatively few input bytes. To preserve malicious functionality, previous attacks either add bytes to existing non-functional areas of...
Uploaded on: April 14, 2023