Benjamin M. Ampel
Benjamin M. Ampel
Home
Research
Publications
Teaching
Invited Talks
Awards
Service
CV
Contact
1
Mapping Exploit Code on Paste Sites to the MITRE ATT&CK Framework: A Multi-label Transformer Approach
Paste sites serve as repositories for sharing code snippets, including malicious exploit code. Understanding how these exploits map to …
Benjamin M. Ampel
,
Tala Vahedi
,
Sagar Samtani
,
Hsinchun Chen
Last updated on Feb 5, 2026
PDF
DOI
Benchmarking the Robustness of Phishing Email Detection Systems
Phishing emails have emerged as one of the most common forms of social engineering attacks inflicting organizations. To combat this …
Benjamin M. Ampel
,
Yang Gao
,
James Hu
,
Sagar Samtani
,
Hsinchun Chen
Last updated on Feb 5, 2026
PDF
The Effect of Consensus Algorithm on Ethereum Price and Volume
On September 15, 2022, Ethereum shifted from a proof-of-work to a proof-of-stake consensus algorithm. Did this shift lead to an …
Benjamin M. Ampel
Last updated on Feb 5, 2026
PDF
The Role of AI Agents for De-Escalating Commitment in Digital Innovation Projects
The increasing complexity of managerial decision-making for digital innovation activities accelerates cognitive biases like escalation …
Carolin Marx
,
Benjamin M. Ampel
,
Ben Lazarine
Last updated on Feb 5, 2026
PDF
Distilling Contextual Embeddings Into A Static Word Embedding For Improving Hacker Forum Analytics
Hacker forums provide malicious actors with a large database of tutorials, goods, and assets to leverage for cyber-attacks. Careful …
Benjamin M. Ampel
,
Hsinchun Chen
Last updated on Feb 5, 2026
PDF
DOI
Exploring the Evolution of Exploit-Sharing Hackers: An Unsupervised Graph Embedding Approach
Cybercrime was estimated to cost the global economy $945 billion in 2020. Increasingly, law enforcement agencies are using social …
Kaeli Otto
,
Benjamin M. Ampel
,
Sagar Samtani
,
Hongyi Zhu
,
Hsinchun Chen
Last updated on Feb 5, 2026
PDF
DOI
Identifying and Categorizing Malicious Content on Paste Sites: A Neural Topic Modeling Approach
Malicious cyber activities impose substantial costs on the U.S. economy and global markets. Cyber-criminals often use …
Tala Vahedi
,
Benjamin M. Ampel
,
Sagar Samtani
,
Hsinchun Chen
Last updated on Feb 5, 2026
PDF
DOI
Linking Common Vulnerabilities and Exposures to the MITRE ATT&CK Framework: A Self-Distillation Approach
Common Vulnerabilities and Exposures (CVEs) are used by cybersecurity analysts, networks, and endpoints managers to identify and …
Benjamin M. Ampel
,
Sagar Samtani
,
Steven Ullman
,
Hsinchun Chen
Last updated on Feb 5, 2026
PDF
DOI
Identifying Vulnerable GitHub Repositories and Users in Scientific Cyberinfrastructure: An Unsupervised Graph Embedding Approach
The scientific cyberinfrastructure community heavily relies on public internet-based systems (e.g., GitHub) to share resources and …
Ben Lazarine
,
Sagar Samtani
,
Mark Patton
,
Hongyi Zhu
,
Steven Ullman
,
Benjamin M. Ampel
,
Hsinchun Chen
Last updated on Feb 5, 2026
PDF
DOI
Labeling Hacker Exploits for Proactive Cyber Threat Intelligence: A Deep Transfer Learning Approach
With the rapid development of new technologies, vulnerabilities are at an all-time high. Companies are investing in developing Cyber …
Benjamin M. Ampel
,
Sagar Samtani
,
Hongyi Zhu
,
Steven Ullman
,
Hsinchun Chen
Last updated on Feb 5, 2026
PDF
DOI
«
»