Xu et al., 2016 - Google Patents
Automatically evading classifiersXu et al., 2016
View PDF- Document ID
- 672080941662504639
- Author
- Xu W
- Qi Y
- Evans D
- Publication year
- Publication venue
- Proceedings of the 2016 network and distributed systems symposium
External Links
Snippet
Machine learning is widely used to develop classifiers for security tasks. However, the robustness of these methods against motivated adversaries is uncertain. In this work, we propose a generic method to evaluate the robustness of classifiers under attack. The key …
- 230000006399 behavior 0 abstract description 47
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2145—Inheriting rights or properties, e.g., propagation of permissions or restrictions within a hierarchy
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Error detection; Error correction; Monitoring responding to the occurence of a fault, e.g. fault tolerance
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Xu et al. | Automatically evading classifiers | |
CN109271780B (en) | Method, system, and computer readable medium for machine learning malware detection model | |
Vinod et al. | A machine learning based approach to detect malicious android apps using discriminant system calls | |
Kolter et al. | Learning to detect and classify malicious executables in the wild. | |
Kapravelos et al. | Revolver: An automated approach to the detection of evasive web-based malware | |
US20110041179A1 (en) | Malware detection | |
JP2019079493A (en) | System and method for detecting malicious files using machine learning | |
Nissim et al. | Keeping pace with the creation of new malicious PDF files using an active-learning based detection framework | |
Siddiqui | Data mining methods for malware detection | |
Mehdi et al. | Imad: in-execution malware analysis and detection | |
Eskandari et al. | To incorporate sequential dynamic features in malware detection engines | |
Nataraj | A signal processing approach to malware analysis | |
Yan et al. | Automatic malware classification via PRICoLBP | |
Canzanese Jr | Detection and classification of malicious processes using system call analysis | |
Mishra | Methods of Virus detection and their limitations | |
Coffman et al. | Quantifying the effectiveness of software diversity using near-duplicate detection algorithms | |
Jordan et al. | Unacceptable behavior: Robust pdf malware detection using abstract interpretation | |
Kumar | A framework for malware detection with static features using machine learning algorithms | |
Crepaldi | Automatic malware signature generation | |
Rhode | Racing demons: Malware detection in early execution | |
Karanth et al. | Pattern mining for future attacks | |
Saleh | Detection and classification of obfuscated malware | |
Yusoff et al. | A framework for optimizing malware classification by using genetic algorithm | |
San | Effective Malicious Features Extraction and Classification for Incident Handling Systems | |
Karanth et al. | ZDVUE: prioritization of javascript attacks to discover new vulnerabilities |