security
Recent Advances in Malware Detection: Graph Learning and Explainability
Shokouhinejad, Hossein, Razavi-Far, Roozbeh, Mohammadian, Hesamodin, Rabbani, Mahdi, Ansong, Samuel, Higgins, Griffin, Ghorbani, Ali A
The rapid evolution of malware has necessitated the development of sophisticated detection methods that go beyond traditional signature-based approaches. Graph learning techniques have emerged as powerful tools for modeling and analyzing the complex relationships inherent in malware behavior, leveraging advancements in Graph Neural Networks (GNNs) and related methods. This survey provides a comprehensive exploration of recent advances in malware detection, focusing on the interplay between graph learning and explainability. It begins by reviewing malware analysis techniques and datasets, emphasizing their foundational role in understanding malware behavior and supporting detection strategies. The survey then discusses feature engineering, graph reduction, and graph embedding methods, highlighting their significance in transforming raw data into actionable insights, while ensuring scalability and efficiency. Furthermore, this survey focuses on explainability techniques and their applications in malware detection, ensuring transparency and trustworthiness. By integrating these components, this survey demonstrates how graph learning and explainability contribute to building robust, interpretable, and scalable malware detection systems. Future research directions are outlined to address existing challenges and unlock new opportunities in this critical area of cybersecurity.
- North America > United States > California > San Francisco County > San Francisco (0.14)
- North America > United States > New York > New York County > New York City (0.04)
- North America > Canada > Ontario > Toronto (0.04)
- (3 more...)
- Overview (1.00)
- Research Report > New Finding (0.92)
- Information Technology > Security & Privacy (1.00)
- Government > Military > Cyberwarfare (0.48)
A Match Made in Heaven? Matching Test Cases and Vulnerabilities With the VUTECO Approach
Iannone, Emanuele, Bui, Quang-Cuong, Scandariato, Riccardo
Software vulnerabilities are commonly detected via static analysis, penetration testing, and fuzzing. They can also be found by running unit tests - so-called vulnerability-witnessing tests - that stimulate the security-sensitive behavior with crafted inputs. Developing such tests is difficult and time-consuming; thus, automated data-driven approaches could help developers intercept vulnerabilities earlier. However, training and validating such approaches require a lot of data, which is currently scarce. This paper introduces VUTECO, a deep learning-based approach for collecting instances of vulnerability-witnessing tests from Java repositories. VUTECO carries out two tasks: (1) the "Finding" task to determine whether a test case is security-related, and (2) the "Matching" task to relate a test case to the exact vulnerability it is witnessing. VUTECO successfully addresses the Finding task, achieving perfect precision and 0.83 F0.5 score on validated test cases in VUL4J and returning 102 out of 145 (70%) correct security-related test cases from 244 open-source Java projects. Despite showing sufficiently good performance for the Matching task - i.e., 0.86 precision and 0.68 F0.5 score - VUTECO failed to retrieve any valid match in the wild. Nevertheless, we observed that in almost all of the matches, the test case was still security-related despite being matched to the wrong vulnerability. In the end, VUTECO can help find vulnerability-witnessing tests, though the matching with the right vulnerability is yet to be solved; the findings obtained lay the stepping stone for future research on the matter.
- North America > United States > New York > New York County > New York City (0.05)
- Europe > Germany > Hamburg (0.04)
- North America > United States > Massachusetts > Suffolk County > Boston (0.04)
- Information Technology > Software (1.00)
- Information Technology > Artificial Intelligence > Natural Language (1.00)
- Information Technology > Artificial Intelligence > Machine Learning > Performance Analysis > Accuracy (1.00)
- Information Technology > Artificial Intelligence > Machine Learning > Neural Networks > Deep Learning (1.00)
On Deep Learning in Password Guessing, a Survey
The security of passwords is dependent on a thorough understanding of the strategies used by attackers. Unfortunately, real-world adversaries use pragmatic guessing tactics like dictionary attacks, which are difficult to simulate in password security research. Dictionary attacks must be carefully configured and modified to be representative of the actual threat. This approach, however, needs domain-specific knowledge and expertise that are difficult to duplicate. This paper compares various deep learning-based password guessing approaches that do not require domain knowledge or assumptions about users' password structures and combinations. The involved model categories are Recurrent Neural Networks, Generative Adversarial Networks, Autoencoder, and Attention mechanisms. Additionally, we proposed a promising research experimental design on using variations of IWGAN on password guessing under non-targeted offline attacks. Using these advanced strategies, we can enhance password security and create more accurate and efficient Password Strength Meters.
- North America > United States > District of Columbia > Washington (0.05)
- North America > United States > New York > New York County > New York City (0.04)
- North America > Canada > Ontario > Durham Region > Oshawa (0.04)
- Asia > India (0.04)
Graph Neural Networks: A Powerful and Versatile Tool for Advancing Design, Reliability, and Security of ICs
Alrahis, Lilas, Knechtel, Johann, Sinanoglu, Ozgur
Graph neural networks (GNNs) have pushed the state-of-the-art (SOTA) for performance in learning and predicting on large-scale data present in social networks, biology, etc. Since integrated circuits (ICs) can naturally be represented as graphs, there has been a tremendous surge in employing GNNs for machine learning (ML)-based methods for various aspects of IC design. Given this trajectory, there is a timely need to review and discuss some powerful and versatile GNN approaches for advancing IC design. In this paper, we propose a generic pipeline for tailoring GNN models toward solving challenging problems for IC design. We outline promising options for each pipeline element, and we discuss selected and promising works, like leveraging GNNs to break SOTA logic obfuscation. Our comprehensive overview of GNNs frameworks covers (i) electronic design automation (EDA) and IC design in general, (ii) design of reliable ICs, and (iii) design as well as analysis of secure ICs. We provide our overview and related resources also in the GNN4IC hub at https://github.com/DfX-NYUAD/GNN4IC. Finally, we discuss interesting open problems for future research.
- Asia > Middle East > UAE > Abu Dhabi Emirate > Abu Dhabi (0.04)
- North America > United States > New York (0.04)
- Semiconductors & Electronics (1.00)
- Information Technology > Security & Privacy (1.00)
Top Innovative Artificial Intelligence (AI) Powered Startups Based in Israel (2022)
Revolution in Artificial Intelligence is causing a paradigm change in almost every field of the tech industry. Various startups around the world are transforming and making lives easier using the aid of AI. In this article, let's look at some of the most innovative AI startups founded in Israel. Voiceitt has created a speech recognition app to make it easier for those with speech disorders, disabilities, or impairments to be heard and understood. Its proprietary automatic speech recognition (ASR) technology converts irregular patterns into understandable speech in real time.
- Information Technology > Services (0.95)
- Information Technology > Security & Privacy (0.70)
Inserting a Backdoor into a Machine-Learning System - Schneier on Security
Nice to hear from you, I hope you are well and life is not to hectic. "For myself, it is the front door into ML that is more worrying." What actually worries me is not "the method" of perversion of which ML appears to have endless varieties at every point (thus is not fit for honest purpose). As I've pointed out before, in "The King Game" there is the notion of "The Godhead". Where the King is a direct conduit to God's words thus wishes.
Inference attacks -- The SQL injection of the future
Can you guess what type of attack this is? If you guessed SQL injection attacks, then I hate to tell you, but you are wrong. Say hello to inference attacks against A.I. and Machine Learning applications which are poised to be the SQL injection attacks of tomorrow Just like SQL injections happened due to security weaknesses in code and required a fix at the source code level; Inference attacks happen due to the underlying AI algorithm. To understand Inference attacks, let us take a look at how AI and Machine Learning systems work. A Machine Learning (ML) system uses training data to build up its knowledge over time and make decisions or predictions.
When Handcrafted Features and Deep Features Meet Mismatched Training and Test Sets for Deepfake Detection
Xu, Ying, Yayilgan, Sule Yildirim
The accelerated growth in synthetic visual media generation and manipulation has now reached the point of raising significant concerns and posing enormous intimidations towards society. There is an imperative need for automatic detection networks towards false digital content and avoid the spread of dangerous artificial information to contend with this threat. In this paper, we utilize and compare two kinds of handcrafted features(SIFT and HoG) and two kinds of deep features(Xception and CNN+RNN) for the deepfake detection task. We also check the performance of these features when there are mismatches between training sets and test sets. Evaluation is performed on the famous FaceForensics++ dataset, which contains four sub-datasets, Deepfakes, Face2Face, FaceSwap and NeuralTextures. The best results are from Xception, where the accuracy could surpass over 99\% when the training and test set are both from the same sub-dataset. In comparison, the results drop dramatically when the training set mismatches the test set. This phenomenon reveals the challenge of creating a universal deepfake detection system.
- Europe > Spain > Catalonia > Barcelona Province > Barcelona (0.04)
- Europe > Norway (0.04)
- Asia > Middle East > Republic of Türkiye > Karaman Province > Karaman (0.04)
- Asia > Japan > Honshū > Chūbu > Nagano Prefecture > Nagano (0.04)