Follow
Harel Berger
Harel Berger
Verified email at georgetown.edu - Homepage
Title
Cited by
Cited by
Year
Evasion is not enough: A case study of android malware
H Berger, C Hajaj, A Dvir
International Symposium on Cyber Security Cryptography and Machine Learning …, 2020
142020
A wrinkle in time: a case study in DNS poisoning
H Berger, AZ Dvir, M Geva
International Journal of Information Security 20, 313-329, 2021
112021
Crystal ball: From innovative attacks to attack effectiveness classifier
H Berger, C Hajaj, E Mariconti, A Dvir
IEEE Access 10, 1317-1333, 2021
10*2021
Do you think you can hold me? the real challenge of problem-space evasion attacks
H Berger, A Dvir, C Hajaj, R Ronen
arXiv preprint arXiv:2205.04293, 2022
22022
Stableyolo: Optimizing image generation for large language models
H Berger, A Dakhama, Z Ding, K Even-Mendoza, D Kelly, H Menendez, ...
International Symposium on Search Based Software Engineering, 133-139, 2023
12023
Breaking the structure of MaMaDroid
H Berger, A Dvir, E Mariconti, C Hajaj
Expert Systems with Applications 228, 120429, 2023
1*2023
Problem-space evasion attacks in the Android OS: a survey
H Berger, C Hajaj, A Dvir
arXiv preprint arXiv:2205.14576, 2022
12022
Can you See me? On the Visibility of NOPs against Android Malware Detectors
D Soi, D Maiorca, G Giacinto, H Berger
arXiv preprint arXiv:2312.17356, 2023
2023
A Production Suite for Failure Detectors
J Dong, R Xin, H Berger, O Marin
2023 International Conference on Intelligent Computing and Next Generation …, 2023
2023
Cadence: A Simulator for Human Movement-based Communication Protocols
H Berger, M Sherr, A Aviv
Proceedings of the 16th Cyber Security Experimentation and Test Workshop, 26-31, 2023
2023
King’s Research Portal
H Berger, A Dakhama, Z Ding, K Even-Mendoza, D Kelly, HD Menendez, ...
The system can't perform the operation now. Try again later.
Articles 1–11