Publications

Peer-Reviewed Publications from NortonLifeLock Research Group

pdf
Inference Attacks Against Graph Neural Networks

In Proceedings of the 31st USENIX Security Symposium (USENIX Security 2022)

pdf
A Large-scale Temporal Measurement of Android Malicious Apps: Persistence, Migration, and Lessons Learned

In Proceedings of the 31st USENIX Security Symposium (USENIX Security 2022)

pdf
When Sally Met Trackers: Web Tracking From the Users' Perspective

In Proceedings of the 31st USENIX Security Symposium (USENIX Security 2022).

pdf
Model Stealing Attacks Against Inductive Graph Neural Networks

In Proceedings of the 43nd IEEE Symposium on Security and Privacy (S&P 2022)

Related News

Secure systems map

Secure Systems

Central to trust in an increasingly digital world is the ability to detect and prevent attacks in modern (and not so modern) information systems. This research includes building secure software, supporting forensics, malware analysis, browser/web/network security, and information-centric security.

LEARN MORE
Man entering credit card details on tablet

Privacy, Identity, and Trust

Consumers and corporations are driven to engage in a digital world that they cannot adequately trust. We are developing paradigms to enable online commerce and facilitate machine learning in ways that provide privacy and protect user identities, by leveraging such concepts as local differential privacy, federated machine learning, identity brokering, and blockchain technology.

LEARN MORE
machine learning image

Robust and Fair Machine Learning, Data Mining, and Artificial Intelligence

The tremendous growth in the learning capacity of Machine Learning methods has yet to be met with a corresponding growth in our ability to understand these models. Equally troubling, our ability to build robust machine learning models has not kept pace with research in adversarial attacks against machine learning. As we increasingly hand over decision making to automated machine learning and AI systems, we must find ways that the life-altering decisions made by these systems can be audited for fairness, safety, robustness to adversaries, and the preservation of privacy of any personally identifiable information over which they operate.

LEARN MORE