Skip to main content

Publications

Zhou G, Liu Y, Yan Z, Gelenbe E. 2024. Is ChatGPT Trustworthy Enough? A Review. IEEE Consumer Electronics Magazine 2024. Publications

Zhou G, Liu Y, Yan Z, Gelenbe E. 2024. Is ChatGPT Trustworthy Enough? A Review. IEEE Consumer Electronics Magazine 2024.

Journal: IEEE Consumer Electronics Magazine, vol. 13, 2024 Authors: Zhou G, Liu Y, Yan Z, Gelenbe E. Abstract: ChatGPT, as an advanced model that seamlessly integrates into diverse digital interactions, shows great potential to enhance the performance of consumer technology and reshape its landscape. The critical question of its trustworthiness…
Siavvas M, Xanthopoulou G, Kalouptsoglou I, Kehagias D, Tzovaras D. 2024. Digital Transformation of Security Standards: Requirements Extraction using Large Language Models. DSA 2024. Publications

Siavvas M, Xanthopoulou G, Kalouptsoglou I, Kehagias D, Tzovaras D. 2024. Digital Transformation of Security Standards: Requirements Extraction using Large Language Models. DSA 2024.

Conference: 11th International Conference on Dependable Systems and Their Applications (DSA2024), 2-3. November 2024, Taicang, Suzhou, China Authors: Siavvas M, Xanthopoulou G, Kalouptsoglou I, Kehagias D, Tzovaras D. Abstract: Compliance with international security standards is essential for ensuring the security of information systems, and thereby their dependability and trustworthiness. Compliance…
Barakat R, Josten S, Schneider M. 2024. Buffer Access Monitoring for Enhanced Buffer Overflow Detection in Fuzzing. EuroCyberSec 2024. Publications

Barakat R, Josten S, Schneider M. 2024. Buffer Access Monitoring for Enhanced Buffer Overflow Detection in Fuzzing. EuroCyberSec 2024.

Conference: EuroCyberSec 2024, 23. October 2024, Krakow, Poland Authors: Barakat R, Josten S, Schneider M. Abstract: Buffer overflows remain one of the most critical and widespread vulnerabilities in software systems. Traditional fuzzing techniques often lack the precision required to reliably detect buffer overflows. This paper presents BUFFERMONITOR, a novel approach…
Maliga D, Nagy R, Buttyán L. 2024. A pipeline for processing large datasets of potentially malicious binaries with rate-limited access to a cloud-based malware analysis platform. EuroCyberSec 2024. Publications

Maliga D, Nagy R, Buttyán L. 2024. A pipeline for processing large datasets of potentially malicious binaries with rate-limited access to a cloud-based malware analysis platform. EuroCyberSec 2024.

Conference: EuroCyberSec 2024, 23. October 2024, Krakow, Poland Authors: Maliga D, Nagy R, Buttyán L. Abstract: In this paper, we present a pipeline that we designed for cleaning and processing large datasets of potentially malicious binaries using access to a rate-limited cloud-based malware analysis platform. Our goal is to efficiently…
Kalouptsoglou I, Siavvas M, Ampatzoglou A, Kehagias D, Chatzigeorgiou A. 2024. Vulnerability prediction using pre-trained models: An empirical evaluation. EuroCyberSec 2024. Publications

Kalouptsoglou I, Siavvas M, Ampatzoglou A, Kehagias D, Chatzigeorgiou A. 2024. Vulnerability prediction using pre-trained models: An empirical evaluation. EuroCyberSec 2024.

Conference: EuroCyberSec 2024, 23. October 2024, Krakow, Poland Authors: Kalouptsoglou I, Siavvas M, Ampatzoglou A, Kehagias D, Chatzigeorgiou A. Abstract: The rise of Large Language Models (LLMs) has provided new directions for addressing downstream text classification tasks, such as vulnerability prediction, where segments of the source code are classified as…