Picture for Sean Oesch

Sean Oesch

Attacks and Defenses Against LLM Fingerprinting

Add code
Aug 12, 2025
Figure 1 for Attacks and Defenses Against LLM Fingerprinting
Figure 2 for Attacks and Defenses Against LLM Fingerprinting
Figure 3 for Attacks and Defenses Against LLM Fingerprinting
Figure 4 for Attacks and Defenses Against LLM Fingerprinting
Viaarxiv icon

On the Abuse and Detection of Polyglot Files

Add code
Jul 01, 2024
Figure 1 for On the Abuse and Detection of Polyglot Files
Figure 2 for On the Abuse and Detection of Polyglot Files
Figure 3 for On the Abuse and Detection of Polyglot Files
Figure 4 for On the Abuse and Detection of Polyglot Files
Viaarxiv icon

The Path To Autonomous Cyber Defense

Add code
Apr 12, 2024
Figure 1 for The Path To Autonomous Cyber Defense
Figure 2 for The Path To Autonomous Cyber Defense
Figure 3 for The Path To Autonomous Cyber Defense
Viaarxiv icon

Toward the Detection of Polyglot Files

Add code
Apr 13, 2022
Figure 1 for Toward the Detection of Polyglot Files
Figure 2 for Toward the Detection of Polyglot Files
Figure 3 for Toward the Detection of Polyglot Files
Figure 4 for Toward the Detection of Polyglot Files
Viaarxiv icon

Beyond the Hype: A Real-World Evaluation of the Impact and Cost of Machine Learning--Based Malware Detection

Add code
Dec 16, 2020
Figure 1 for Beyond the Hype: A Real-World Evaluation of the Impact and Cost of Machine Learning--Based Malware Detection
Figure 2 for Beyond the Hype: A Real-World Evaluation of the Impact and Cost of Machine Learning--Based Malware Detection
Figure 3 for Beyond the Hype: A Real-World Evaluation of the Impact and Cost of Machine Learning--Based Malware Detection
Figure 4 for Beyond the Hype: A Real-World Evaluation of the Impact and Cost of Machine Learning--Based Malware Detection
Viaarxiv icon

An Assessment of the Usability of Machine Learning Based Tools for the Security Operations Center

Add code
Dec 16, 2020
Figure 1 for An Assessment of the Usability of Machine Learning Based Tools for the Security Operations Center
Figure 2 for An Assessment of the Usability of Machine Learning Based Tools for the Security Operations Center
Figure 3 for An Assessment of the Usability of Machine Learning Based Tools for the Security Operations Center
Figure 4 for An Assessment of the Usability of Machine Learning Based Tools for the Security Operations Center
Viaarxiv icon