Suivre
Harel Berger
Harel Berger
Adresse e-mail validée de georgetown.edu - Page d'accueil
Titre
Citée par
Citée par
Année
Evasion is not enough: A case study of android malware
H Berger, C Hajaj, A Dvir
International Symposium on Cyber Security Cryptography and Machine Learning …, 2020
152020
Crystal ball: From innovative attacks to attack effectiveness classifier
H Berger, C Hajaj, E Mariconti, A Dvir
IEEE Access 10, 1317-1333, 2021
12*2021
A wrinkle in time: a case study in DNS poisoning
H Berger, AZ Dvir, M Geva
International Journal of Information Security 20, 313-329, 2021
112021
Stableyolo: Optimizing image generation for large language models
H Berger, A Dakhama, Z Ding, K Even-Mendoza, D Kelly, H Menendez, ...
International Symposium on Search Based Software Engineering, 133-139, 2023
52023
Breaking the structure of MaMaDroid
H Berger, A Dvir, E Mariconti, C Hajaj
Expert Systems with Applications 228, 120429, 2023
2*2023
Problem-space evasion attacks in the Android OS: a survey
H Berger, C Hajaj, A Dvir
arXiv preprint arXiv:2205.14576, 2022
22022
Do you think you can hold me? the real challenge of problem-space evasion attacks
H Berger, A Dvir, C Hajaj, R Ronen
arXiv preprint arXiv:2205.04293, 2022
22022
Can you See me? On the Visibility of NOPs against Android Malware Detectors
D Soi, D Maiorca, G Giacinto, H Berger
arXiv preprint arXiv:2312.17356, 2023
2023
A Production Suite for Failure Detectors
J Dong, R Xin, H Berger, O Marin
2023 International Conference on Intelligent Computing and Next Generation …, 2023
2023
Cadence: A Simulator for Human Movement-based Communication Protocols
H Berger, M Sherr, A Aviv
Proceedings of the 16th Cyber Security Experimentation and Test Workshop, 26-31, 2023
2023
King’s Research Portal
H Berger, A Dakhama, Z Ding, K Even-Mendoza, D Kelly, HD Menendez, ...
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–11