Daniel Arp

Orcid: 0000-0003-3628-794X

Affiliations:
  • Braunschweig University of Technology, Germany (PhD 2019)
  • University of Göttingen, Germany
  • TU Berlin, Germany


According to our database1, Daniel Arp authored at least 31 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Pitfalls in Machine Learning for Computer Security.
Commun. ACM, November, 2024

TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time (Extended Version).
CoRR, 2024

Listening Between the Bits: Privacy Leaks in Audio Fingerprints.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2024

2023
Lessons Learned on Machine Learning for Computer Security.
IEEE Secur. Priv., 2023

Drift Forensics of Malware Classifiers.
Proceedings of the 16th ACM Workshop on Artificial Intelligence and Security, 2023

2022
Dos and Don'ts of Machine Learning in Computer Security.
Proceedings of the 31st USENIX Security Symposium, 2022

Misleading Deep-Fake Detection with GAN Fingerprints.
Proceedings of the 43rd IEEE Security and Privacy, 2022

Quantifying the Risk of Wormhole Attacks on Bluetooth Contact Tracing.
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022

2021
Spying through Virtual Backgrounds of Video Calls.
Proceedings of the AISec@CCS 2021: Proceedings of the 14th ACM Workshop on Artificial Intelligence and Security, 2021

2020
Against All Odds: Winning the Defense Challenge in an Evasion Competition with Diversification.
CoRR, 2020

Adversarial Preprocessing: Understanding and Preventing Image-Scaling Attacks in Machine Learning.
Proceedings of the 29th USENIX Security Symposium, 2020

Evaluating Explanation Methods for Deep Learning in Security.
Proceedings of the IEEE European Symposium on Security and Privacy, 2020

2019
Erkennung mobiler Schadsoftware mit maschinellen Lernverfahren.
Proceedings of the Ausgezeichnete Informatikdissertationen 2019., 2019

Efficient and Explainable Detection of Mobile Malware with Machine Learning.
PhD thesis, 2019

Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection.
IEEE Trans. Dependable Secur. Comput., 2019

Don't Paint It Black: White-Box Explanations for Deep Learning in Computer Security.
CoRR, 2019

2018
Privacy-Enhanced Fraud Detection with Bloom Filters.
Proceedings of the Security and Privacy in Communication Networks, 2018

Forgotten Siblings: Unifying Attacks on Machine Learning and Digital Watermarking.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018

2017
Fraternal Twins: Unifying Attacks on Machine Learning and Digital Watermarking.
CoRR, 2017

Privacy Threats through Ultrasonic Side Channels on Mobile Devices.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017

Mining Attributed Graphs for Threat Intelligence.
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017

2016
Comprehensive Analysis and Detection of Flash-Based Malware.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2016

2015
Mobile-Sandbox: combining static and dynamic analysis with machine-learning techniques.
Int. J. Inf. Sec., 2015

Pulsar: Stateful Black-Box Fuzzing of Proprietary Network Protocols.
Proceedings of the Security and Privacy in Communication Networks, 2015

VCCFinder: Finding Potential Vulnerabilities in Open-Source Projects to Assist Code Audits.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Torben: A Practical Side-Channel Attack for Deanonymizing Tor Communication.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
Modeling and Discovering Vulnerabilities with Code Property Graphs.
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014

DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

2013
A close look on <i>n</i>-grams in intrusion detection: anomaly detection vs. classification.
Proceedings of the AISec'13, 2013

Structural detection of android malware using embedded call graphs.
Proceedings of the AISec'13, 2013

2012
Real-Time Multi-human Tracking Using a Probability Hypothesis Density Filter and Multiple Detectors.
Proceedings of the Ninth IEEE International Conference on Advanced Video and Signal-Based Surveillance, 2012


  Loading...