Automated Evasion Attacks and Fingerprinting Using Blackbox Differential Automata Learning

Automated Evasion Attacks and Fingerprinting Using Blackbox Differential Automata Learning

ACM CCS via YouTube Direct link

Evaluating Web Security Products

3 of 17

3 of 17

Evaluating Web Security Products

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Automated Evasion Attacks and Fingerprinting Using Blackbox Differential Automata Learning

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Motivation
  3. 3 Evaluating Web Security Products
  4. 4 Why Differential Testing
  5. 5 Why not Differential Testing
  6. 6 Overview
  7. 7 Symbolic Finite Automata (SFA)
  8. 8 Learning Symbolic Automata
  9. 9 Why Differential Automata Learning
  10. 10 Bootstrapping SFA Learning
  11. 11 Difference Analysis
  12. 12 Generating Program Fingerprints
  13. 13 Fingerprint Tree
  14. 14 Evaluation Of Bootstrapping Algorithm
  15. 15 Differences in TCP/IP Implementations
  16. 16 Mac OSX TCP/IP State Machine
  17. 17 Conclusions

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.