We organize a conference for collecting IMSc points in the context of the IT Security BSc course in the spring semester of the 2023/24 academic year at BME. Beyond IMSc point collection, the goal of the conference is to encourage students to deep-dive into some hot topics of IT security, to get familiar with the challenges and recent research results, and to share knowledge with other students in the form of short presentations. We do hope that the conference will shed light on the beauty of the field of IT security and some of its exciting research areas, and it will stimulate both the active participants of the conference and all other students enrolled in the IT security course to engage in further studies in the domain of IT security.
The Call for Papers (CfP) for the conference is available here.
all, uav, cyber-physical-system, vehicle, network-security, power grid, machine-learning, data-evaluation, privacy, economics, malware, binary-similarity, cryptography, machine-learning-security, LLM-security, LLM, copilot, federated-learning, poisoning, password-manager, AAA, OAuth, web-security, Kerberos
Binary code similarity approaches compare two or more pieces of binary code to identify their similarities and differences. This is useful in many applications, including malware detection and analysis. There are many binary code similarity approaches with varying properties, notably with different levels of robustness against attacks. TLSH is a popular hash function that is designed for quantifying binary similarity, but its robustness has been recently challenged.
Tags: binary-similarity
References: