Selected Presentations
From Prompts to Pwns: Exploiting and Securing AI Agents
Black Hat USA 2025
Black Hat Machine Learning (Training)
Black Hat US 2023 & 2024, Black Hat EU 2023
Practical LLM Security: Takeaways From a Year in the Trenches
Black Hat USA 2024
Security Data Science: Getting the Fundamentals Right
BSides Las Vegas 2019
Measuring the Speed of the Red Queen's Race
Black Hat USA 2018 (w/ Felipe Ducau)
Getting Insight Out of and Back into Deep Neural Networks
BSides Las Vegas 2017
Selected Publications
Harang, Richard and Rudd, Ethan M. SOREL-20M: A Large Scale Benchmark Dataset for Malicious PE Detection. arXiv preprint arXiv:2012.07634 (2020)
Caliskan, Aylin; Yamaguchi, Fabian; Dauber, Edwin; Harang, Richard; Rieck, Konrad; Greenstadt, Rachel; Narayanan, Arvind. When coding style survives compilation: De-anonymizing programmers from executable binaries. NDSS 2018
Dauber, E., Caliskan, A., Harang, R. and Greenstadt, R. Git blame who? Stylistic authorship attribution of small, incomplete source code fragments. ICSE 2018
Papernot, N., McDaniel, P., Swami, A. and Harang, R. Crafting adversarial input sequences for recurrent neural networks. MILCOM 2016