[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Šrndić et al., 2014 - Google Patents

Practical evasion of a learning-based classifier: A case study

Šrndić et al., 2014

View PDF
Document ID
14966681153910531461
Author
Šrndić N
Laskov P
Publication year
Publication venue
2014 IEEE symposium on security and privacy

External Links

Snippet

Learning-based classifiers are increasingly used for detection of various forms of malicious data. However, if they are deployed online, an attacker may attempt to evade them by manipulating the data. Examples of such attacks have been previously studied under the …
Continue reading at citeseerx.ist.psu.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/566Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting

Similar Documents

Publication Publication Date Title
Šrndić et al. Practical evasion of a learning-based classifier: A case study
Somesha et al. Efficient deep learning techniques for the detection of phishing websites
Chio et al. Machine learning and security: Protecting systems with data and algorithms
Tavabi et al. Darkembed: Exploit prediction with neural language models
Thomas et al. Machine learning approaches in cyber security analytics
Biggio et al. Is data clustering in adversarial settings secure?
Smutz et al. When a Tree Falls: Using Diversity in Ensemble Classifiers to Identify Evasion in Malware Detectors.
Biggio et al. Security evaluation of support vector machines in adversarial environments
Zhao et al. A review of computer vision methods in network security
Ramanathan et al. phishGILLNET—phishing detection methodology using probabilistic latent semantic analysis, AdaBoost, and co-training
Khorshidpour et al. Evaluation of random forest classifier in security domain
Chen et al. Teacher model fingerprinting attacks against transfer learning
Devine et al. An Adversarial Training Based Machine Learning Approach to Malware Classification under Adversarial Conditions.
Hassan et al. SQL injection vulnerability detection using deep learning: a feature-based approach
Takahata et al. Determining motion of nonrigid objects by active tubes
Mao et al. EvadeRL: Evading PDF malware classifiers with deep reinforcement learning
Patil et al. Learning to detect phishing web pages using lexical and string complexity analysis
Kulkarni et al. Phishing Webpage Detection: Unveiling the Threat Landscape and Investigating Detection Techniques
Maghsoudimehrabani et al. Proactive detection of query-based adversarial scenarios in nlp systems
Dmitrenko Dnn model extraction attacks using prediction interfaces
DeLoach et al. Twitter-enhanced Android malware detection
Bhusal et al. Adversarial patterns: Building robust android malware classifiers
Vähäkainu et al. Adversarial Poisoning Attack's Impact on Prediction Functionality of ML-Based Feedback Loop System in Cyber-Physical Context
Mosli Crafting adversarial examples using particle swarm optimization
Chen Intelligent Malware Detection Using File-to-file Relations and Enhancing its Security against Adversarial Attacks