[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Xu et al., 2016 - Google Patents

Automatically evading classifiers

Xu et al., 2016

View PDF
Document ID
672080941662504639
Author
Xu W
Qi Y
Evans D
Publication year
Publication venue
Proceedings of the 2016 network and distributed systems symposium

External Links

Snippet

Machine learning is widely used to develop classifiers for security tasks. However, the robustness of these methods against motivated adversaries is uncertain. In this work, we propose a generic method to evaluate the robustness of classifiers under attack. The key …
Continue reading at www.inforsec.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2145Inheriting rights or properties, e.g., propagation of permissions or restrictions within a hierarchy
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Error detection; Error correction; Monitoring responding to the occurence of a fault, e.g. fault tolerance
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass

Similar Documents

Publication Publication Date Title
Xu et al. Automatically evading classifiers
CN109271780B (en) Method, system, and computer readable medium for machine learning malware detection model
Vinod et al. A machine learning based approach to detect malicious android apps using discriminant system calls
Kolter et al. Learning to detect and classify malicious executables in the wild.
Kapravelos et al. Revolver: An automated approach to the detection of evasive web-based malware
US20110041179A1 (en) Malware detection
JP2019079493A (en) System and method for detecting malicious files using machine learning
Nissim et al. Keeping pace with the creation of new malicious PDF files using an active-learning based detection framework
Siddiqui Data mining methods for malware detection
Mehdi et al. Imad: in-execution malware analysis and detection
Eskandari et al. To incorporate sequential dynamic features in malware detection engines
Nataraj A signal processing approach to malware analysis
Yan et al. Automatic malware classification via PRICoLBP
Canzanese Jr Detection and classification of malicious processes using system call analysis
Mishra Methods of Virus detection and their limitations
Coffman et al. Quantifying the effectiveness of software diversity using near-duplicate detection algorithms
Jordan et al. Unacceptable behavior: Robust pdf malware detection using abstract interpretation
Kumar A framework for malware detection with static features using machine learning algorithms
Crepaldi Automatic malware signature generation
Rhode Racing demons: Malware detection in early execution
Karanth et al. Pattern mining for future attacks
Saleh Detection and classification of obfuscated malware
Yusoff et al. A framework for optimizing malware classification by using genetic algorithm
San Effective Malicious Features Extraction and Classification for Incident Handling Systems
Karanth et al. ZDVUE: prioritization of javascript attacks to discover new vulnerabilities