Machine learning has proved to be a promising technology to determine whether a piece of software is malicious or benign. However, the accuracy of this approach comes sometimes at the expense of its robustness and probing these systems against adversarial examples is not always a priority. In this work, we present a gradient-based approach that can carefully generate valid executable malicious files that are classified as benign by state-of-the-art detectors. Initial results demonstrate that our approach is able to automatically find optimal adversarial examples in a more efficient way, which can provide a good support for building more robust models in the future
In security-sensitive applications, the success of machine learning depends on a thorough vetting of...
Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Com...
Machine learning has become an important component for many systems and applications including compu...
Machine learning has proved to be a promising technology to determine whether a piece of software is...
Machine learning has proved to be a promising technology to determine whether a piece of software is...
Training classifiers that are robust against adversarially modified examples is becoming increasingl...
While machine learning is vulnerable to adversarial examples, it still lacks systematic procedures a...
While machine learning is vulnerable to adversarial examples, it still lacks systematic procedures a...
The use of machine learning (ML) has become an established practice in the realm of malware classific...
We present a new algorithm to train a robust malware detector. Malware is a prolific problem and mal...
With the rise of the popularity of machine learning (ML), it has been shown that ML-based classifier...
While machine-learning algorithms have demonstrated a strong ability in detecting Android malware, t...
Modern commercial antivirus systems increasingly rely on machine learning to keep up with the rampan...
Cyber security is used to protect and safeguard computers and various networks from ill-intended dig...
A number of online services nowadays rely upon machine learning to extract valuable information from...
In security-sensitive applications, the success of machine learning depends on a thorough vetting of...
Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Com...
Machine learning has become an important component for many systems and applications including compu...
Machine learning has proved to be a promising technology to determine whether a piece of software is...
Machine learning has proved to be a promising technology to determine whether a piece of software is...
Training classifiers that are robust against adversarially modified examples is becoming increasingl...
While machine learning is vulnerable to adversarial examples, it still lacks systematic procedures a...
While machine learning is vulnerable to adversarial examples, it still lacks systematic procedures a...
The use of machine learning (ML) has become an established practice in the realm of malware classific...
We present a new algorithm to train a robust malware detector. Malware is a prolific problem and mal...
With the rise of the popularity of machine learning (ML), it has been shown that ML-based classifier...
While machine-learning algorithms have demonstrated a strong ability in detecting Android malware, t...
Modern commercial antivirus systems increasingly rely on machine learning to keep up with the rampan...
Cyber security is used to protect and safeguard computers and various networks from ill-intended dig...
A number of online services nowadays rely upon machine learning to extract valuable information from...
In security-sensitive applications, the success of machine learning depends on a thorough vetting of...
Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Com...
Machine learning has become an important component for many systems and applications including compu...