DKE research theme

Cybersecurity (SecLab)

Threats against security, privacy, and anonymity are real. They require appropriate answers and solutions.

Highlighted publications

  • Proskurin, S., Lengyel, T., Momeu, M., Eckert, C., & Zarras, A. (2018). Hiding in the Shadows: Empowering ARM for Stealthy Virtual Machine Introspection. In Proceedings of the 34th ACM Annual Computer Security Applications Conference (ACSAC)
    More information about this publication
  • Kolosnjaji, B., Zarras, A., Webster, G., & Eckert, C. (2016). Deep Learning for Classification of Malware System Call Sequences. In Proceedings of the 29th Australasian Joint Conference on Artificial Intelligence (AI)
    More information about this publication
  • Zarras, A., Kohls, K., Dürmuth, M., & Pöpper, C. (2016). Neuralyzer: Flexible Expiration Times for the Revocation of Online Data. In Proceedings of the 6th ACM Conference on Data and Application Security and Privacy (CODASPY)
    More information about this publication