Skip to main content

White papers

Maliga D, Nagy R, Buttyán L. 2024. A pipeline for processing large datasets of potentially malicious binaries with rate-limited access to a cloud-based malware analysis platform. EuroCyberSec 2024. Publications

Maliga D, Nagy R, Buttyán L. 2024. A pipeline for processing large datasets of potentially malicious binaries with rate-limited access to a cloud-based malware analysis platform. EuroCyberSec 2024.

Conference: EuroCyberSec 2024, 23. October 2024, Krakow, Poland Authors: Maliga D, Nagy R, Buttyán L. Abstract: In this paper, we present a pipeline that we designed for cleaning and processing large datasets of potentially malicious binaries using access to a rate-limited cloud-based malware analysis platform. Our goal is to efficiently…
Kalouptsoglou I, Siavvas M, Ampatzoglou A, Kehagias D, Chatzigeorgiou A. 2024. Vulnerability prediction using pre-trained models: An empirical evaluation. EuroCyberSec 2024. Publications

Kalouptsoglou I, Siavvas M, Ampatzoglou A, Kehagias D, Chatzigeorgiou A. 2024. Vulnerability prediction using pre-trained models: An empirical evaluation. EuroCyberSec 2024.

Conference: EuroCyberSec 2024, 23. October 2024, Krakow, Poland Authors: Kalouptsoglou I, Siavvas M, Ampatzoglou A, Kehagias D, Chatzigeorgiou A. Abstract: The rise of Large Language Models (LLMs) has provided new directions for addressing downstream text classification tasks, such as vulnerability prediction, where segments of the source code are classified as…
Siavvas M, Kalouptsoglou I, Gelenbe E, Kehagias D, Tzovaras D. 2024. Transforming the field of Vulnerability Prediction: Are Large Language Models the key? EuroCyberSec 2024. Publications

Siavvas M, Kalouptsoglou I, Gelenbe E, Kehagias D, Tzovaras D. 2024. Transforming the field of Vulnerability Prediction: Are Large Language Models the key? EuroCyberSec 2024.

Conference: EuroCyberSec 2024, 23. October 2024, Krakow, Poland Authors: Siavvas M, Kalouptsoglou I, Gelenbe E, Kehagias D, Tzovaras D. Abstract: Vulnerability prediction is an important mechanism for secure software development, as it enables the early identification and mitigation of software vulnerabilities. Vulnerability prediction models (VPMs) are machine learning (ML) models…
The DOSS IoT Supply Trust Chain (STC) Concept Insights

The DOSS IoT Supply Trust Chain (STC) Concept

By András Vilmos, DOSS Project Coordinator The Supply Chain Security Challenge In today's interconnected world, businesses and individuals increasingly rely on IoT devices, software, and services from a variety of sources, making supply chain security critical. The complexity and opacity of modern supply chains, combined with the implicit trust placed…