Send email Copy Email Address

Threat Detection & Defenses

Attack-detection mechanisms should be able to reliably detect, predict, and comprehnsibly explain both known and novel threats, while also being able to cope with evasion techniques – like obfuscation, polymorphism, or stealth low-volume attacks.

Attack-detection mechanisms should not just be able to detect any critical incident, but also raise alarms only when it is necessary; the more false alarms are raised, the higher the risk that users will ignore warnings or even disable the detection permanently. To provide a strong line of defense, attack detection methods should be complemented by suitable defensive technologies, ideally selected autonomously by the system under attack, to counter whatever threat it encounters. In this research area we pursue this ideal in multiple ways, for example by focusing on the detection and analysis of modern malware, on the prevention and attribution of DDoS attacks, and on the identification and mitigation of novel system vulnerabilities.

OUR LATEST PUBLICATIONS

Year 2021

Conference / Medium

ICCV
Proceedings of the IEEE/CVF International Conference on Computer Vision (ICCV)IEEE International Conference on Computer Vision (ICCV), 2021

Conference / Medium

ICCV
Proceedings of the IEEE/CVF International Conference on Computer Vision (ICCV)IEEE International Conference on Computer Vision (ICCV), 2021

Conference / Medium

EuroS&P
Proceedings of the 6th IEEE European Symposium on Security and Privacy6th IEEE European Symposium on Security and Privacy

Conference / Medium

USENIX-Security
USENIX Security SymposiumUSENIX Security Symposium