\/era🌻 (@eramm314) 's Twitter Profile
\/era🌻

@eramm314

ID: 266212388

calendar_today14-03-2011 21:30:34

2,2K Tweet

136 Followers

108 Following

Cosic.be (@cosicbe) 's Twitter Profile Photo

Lieven Desmet (Lieven Desmet) and Vera Rimmer (DistriNet) giving a shared talk on "Cybersecurity and AI" at the COSIC Course in Leuven today. #cosiccourse #choosecosic esat.kuleuven.be/cosic/events/c…

Lieven Desmet (<a href="/lieven_desmet/">Lieven Desmet</a>) and Vera Rimmer (<a href="/DistriNet/">DistriNet</a>) giving a shared talk on "Cybersecurity and AI" at the COSIC Course in Leuven today.
#cosiccourse #choosecosic
esat.kuleuven.be/cosic/events/c…
\/era🌻 (@eramm314) 's Twitter Profile Photo

Our first keynote of the day, on adversarial evaluations of ML models by Maura Pintor👏! Join us for the rest of the program and two more keynotes on malware detection and analysis 🪲worma.gitlab.io/2024/ IEEE European Symposium on Security and Privacy WoRMA: Workshop on Rethinking Malware Analysis

\/era🌻 (@eramm314) 's Twitter Profile Photo

In the 2nd keynote at WoRMA: Workshop on Rethinking Malware Analysis IEEE European Symposium on Security and Privacy, Daniel Arp Daniel Arp took us back to 2014 to the creation of the famous Drebin dataset and gave a critical view on whether now, a decade later, mobile malware detection is solved. Spoiler: it is not! Still room for more research!

In the 2nd keynote at <a href="/worma_workshop/">WoRMA: Workshop on Rethinking Malware Analysis</a> <a href="/IEEEEUROSP/">IEEE European Symposium on Security and Privacy</a>, Daniel Arp <a href="/darpsec/">Daniel Arp</a> took us back to 2014 to the creation of the famous Drebin dataset and gave a critical view on whether now, a decade later, mobile malware detection is solved. Spoiler: it is not! Still room for more research!
Somesh Jha (@jhasomesh) 's Twitter Profile Photo

Has this happened to you? You write a great paper on trustworthy ML. (1) ML reviewers don't get the security contribution (e.g threat model, adaptive adversary. What is that?) (2) Security reviewers don't get the ML contributions (e.g. what is all that math in there?) We got

\/era🌻 (@eramm314) 's Twitter Profile Photo

Still 4 days left until the early-bird registration deadline for the PhD Summer School on Security, Privacy and AI. Check out the stellar program, apply for a lovely enlightening week in Leuven, and spread the word to your networks! 🧑‍🎓👩‍🎓 cybersecurity-research.be/summer-school-… DistriNet

DistriNet (@distrinet) 's Twitter Profile Photo

The SECAI Summer School program in Leuven cybersecurity-research.be/summer-school-… features 4 key pillars: foundational knowledge, selected expert topics, community building, and industry insights. See this year's breakdown of each pillar below:

Bart Preneel (@bpreneel1) 's Twitter Profile Photo

TLDR; #chatcontrol proposal tweaked but it remains unacceptable: the solution does not work, undermines end-to-end encryption, is indiscriminate, leads to function creep and abuse by dictators and undermines the security of users and the current techniques to detect CSAM.🧵2/16

NDC Conferences (@ndc_conferences) 's Twitter Profile Photo

Join Vera Rimmer's "Navigating the Security and Privacy Landscape of Modern AI" in which you'll overview the general security and privacy landscape of #AI technologies at #NDCSecurity! #Earlybird offer ends Friday, October 14! #machinelearning ow.ly/tcBM50TIByc

Lorenzo Cavallaro (@lcavallaro) 's Twitter Profile Photo

[PhD position] Want to work at the intersection of Program Analysis and Machine Learning for Trustworthy AI for Malware Detection? Competitive fully-funded PhD position at UCL Computer Science to work with Fabio Pierazzi and myself! Explore the wonders of AI for systems security... done right!

\/era🌻 (@eramm314) 's Twitter Profile Photo

There are still more than 3 weeks to share your thought-provoking work in the realm of malware research! We hope to see your submissions coming in and to meet in Venice🇮🇹☀️