User profiles for T. Dumitras

Tudor Dumitras

Assistant Professor, University of Maryland, College Park
Verified email at umiacs.umd.edu
Cited by 6396

Poison frogs! targeted clean-label poisoning attacks on neural networks

…, C Studer, T Dumitras, T Goldstein - Advances in neural …, 2018 - proceedings.neurips.cc
Data poisoning is an attack on machine learning models wherein the attacker adds examples
to the training set to manipulate the behavior of the model at test time. This paper explores …

Before we knew it: an empirical study of zero-day attacks in the real world

L Bilge, T Dumitraş - Proceedings of the 2012 ACM conference on …, 2012 - dl.acm.org
Little is known about the duration and prevalence of zero-day attacks, which exploit vulnerabilities
that have not been disclosed publicly. Knowledge of new vulnerabilities gives cyber …

Vulnerability disclosure in the age of social media: Exploiting twitter for predicting {Real-World} exploits

C Sabottke, O Suciu, T Dumitraș - 24th USENIX Security Symposium …, 2015 - usenix.org
In recent years, the number of software vulnerabilities discovered has grown significantly.
This creates a need for prioritizing the response to new disclosures by assessing which …

When does machine learning {FAIL}? generalized transferability for evasion and poisoning attacks

…, Y Kaya, H Daume III, T Dumitras - 27th USENIX Security …, 2018 - usenix.org
… Our attack consists of selecting base instances that are close to the target t in deep feature
space, but are labeled by the oracle as the attacker’s desired label yd. CRAFTINSTANCE cre…

Shallow-deep networks: Understanding and mitigating network overthinking

Y Kaya, S Hong, T Dumitras - International conference on …, 2019 - proceedings.mlr.press
We characterize a prevalent weakness of deep neural networks (DNNs),’overthinking’,
which occurs when a DNN can reach correct predictions before its final layer. Overthinking is …

Cloud software upgrades: Challenges and opportunities

I Neamtiu, T Dumitraş - … on the Maintenance and Evolution of …, 2011 - ieeexplore.ieee.org
The fast evolution pace for cloud computing software is on a collision course with our growing
reliance on cloud computing. On one hand, cloud software must have the agility to evolve …

Terminal brain damage: Exposing the graceless degradation in deep neural networks under hardware fault attacks

…, P Frigo, Y Kaya, C Giuffrida, T Dumitraș - 28th USENIX Security …, 2019 - usenix.org
Deep neural networks (DNNs) have been shown to tolerate" brain damage": cumulative
changes to the network's parameters (eg, pruning, numerical perturbations) typically result in a …

The attack of the clones: A study of the impact of shared code on vulnerability patching

…, L Bilge, J Caballero, T Dumitras - … IEEE symposium on …, 2015 - ieeexplore.ieee.org
… Right-censoring and lefttruncation are well studied in statistics, and in this paper we
compute the values of S(t) using the Kaplan-Meier estimator, which accounts for truncated and …

The dropper effect: Insights into malware distribution with downloader graph analytics

…, J Mondal, J Jang, L Bilge, T Dumitraş - Proceedings of the 22nd …, 2015 - dl.acm.org
… 11.4 t 1.1 … [7] T. Dumitras, and D. Shou. Toward a standard benchmark for computer
security research: The Worldwide Intelligence Network Environment (WINE). …

Featuresmith: Automatically engineering features for malware detection by mining the security literature

Z Zhu, T Dumitraş - Proceedings of the 2016 ACM SIGSAC Conference …, 2016 - dl.acm.org
Malware detection increasingly relies on machine learning techniques, which utilize
multiple features to separate the malware from the benign apps. The effectiveness of these …