no code implementations • 6 Dec 2023 • Anish Singh Shekhawat, Fabio Di Troia, Mark Stamp
In this paper, we apply three machine learning techniques to the problem of distinguishing malicious encrypted HTTP traffic from benign encrypted traffic and obtain results comparable to previous work.
no code implementations • 9 Nov 2023 • Anant Shukla, Martin Jurecek, Mark Stamp
Bot activity on social media platforms is a pervasive problem, undermining the credibility of online discourse and potentially leading to cybercrime.
no code implementations • 29 Aug 2023 • Rishit Agrawal, Kelvin Jou, Tanush Obili, Daksh Parikh, Samarth Prajapati, Yash Seth, Charan Sridhar, Nathan Zhang, Mark Stamp
In this research, we consider the general question of the steganographic capacity of learning models.
no code implementations • 19 Aug 2023 • Pavla Louthánová, Matouš Kozák, Martin Jureček, Mark Stamp
Machine learning has proven to be a useful tool for automated malware detection, but machine learning models have also been shown to be vulnerable to adversarial attacks.
no code implementations • 17 Jul 2023 • Aditya Raghavan, Fabio Di Troia, Mark Stamp
One machine learning technique that has been used widely in the field of pattern matching in general-and malware detection in particular-is hidden Markov models (HMMs).
no code implementations • 7 Jul 2023 • Ritik Mehta, Olha Jurečková, Mark Stamp
Many different machine learning and deep learning techniques have been successfully employed for malware detection and classification.
no code implementations • 7 Jul 2023 • Atharva Sharma, Martin Jureček, Mark Stamp
In previous research, keystroke dynamics has shown promise for user authentication, based on both fixed-text and free-text data.
no code implementations • 2 Jul 2023 • Brooke Dalton, Mark Stamp
We also find that ciphers that are more similar in design are somewhat more challenging to distinguish, but not as difficult as might be expected.
no code implementations • 25 Jun 2023 • Lei Zhang, Dong Li, Olha Jurečková, Mark Stamp
We find that the steganographic capacity of the learning models tested is surprisingly high, and that in each case, there is a clear threshold after which model performance rapidly degrades.
1 code implementation • 23 Jun 2023 • Matouš Kozák, Martin Jureček, Mark Stamp, Fabio Di Troia
Machine learning is becoming increasingly popular as a go-to approach for many tasks due to its world-class results.
no code implementations • 1 May 2023 • Olha Jurečková, Martin Jureček, Mark Stamp, Fabio Di Troia, Róbert Lórencz
Based on the classification score of the multilayer perceptron, we determined which samples would be classified and which would be clustered into new malware families.
no code implementations • 22 Mar 2023 • Yashna Peerthum, Mark Stamp
To conduct our experiments, we implement two new optimizers in PyTorch, namely, a version of BatchNorm that we refer to as AffineLayer, which includes the re-parameterization step without normalization, and a version with just the normalization step, that we call BatchNorm-minus.
no code implementations • 22 Mar 2023 • Vrinda Malhotra, Katerina Potika, Mark Stamp
Traditional detection strategies, such as signature scanning, rely on manual analysis of malware to extract relevant features, which is labor intensive and requires expert knowledge.
no code implementations • 8 Aug 2022 • Eric Liang, Mark Stamp
After extensive testing of our system in real-world environments, we conclude that it is feasible as a back-up system that can compliment existing crosswalk buttons, and thereby improve the overall safety of crossing the street.
no code implementations • 27 Jun 2022 • Samanvitha Basole, Fabio Di Troia, Mark Stamp
When training a machine learning model, there is likely to be a tradeoff between accuracy and the diversity of the dataset.
no code implementations • 12 Jun 2022 • Nhien Rust-Nguyen, Mark Stamp
Previous research has employed machine learning and deep learning techniques to automate the detection of darknet traffic in an attempt to block these criminal activities.
no code implementations • 8 Jun 2022 • Huy Nguyen, Fabio Di Troia, Genya Ishigaki, Mark Stamp
We also evaluate the utility of the GAN generative model for adversarial attacks on image-based malware detection.
no code implementations • 8 Jun 2022 • Andrew Miller, Fabio Di Troia, Mark Stamp
In this research, we experiment with adding momentum to the Baum-Welch expectation-maximization algorithm for training Hidden Markov Models.
no code implementations • 2 Apr 2022 • Tazmina Sharmin, Fabio Di Troia, Katerina Potika, Mark Stamp
In this research, we consider the problem of image spam detection, based on image analysis.
no code implementations • 13 Mar 2022 • Anusha Damodaran, Fabio Di Troia, Visaggio Aaron Corrado, Thomas H. Austin, Mark Stamp
In this research, we compare malware detection techniques based on static, dynamic, and hybrid analysis.
no code implementations • 3 Oct 2021 • Elliu Huang, Fabio Di Troia, Mark Stamp
Although prior research has shown that deep learning models are vulnerable to adversarial attacks, relatively little research has been done in the adversarial domain for behavioral biometrics.
no code implementations • 26 Jul 2021 • Ruchira Gothankar, Fabio Di Troia, Mark Stamp
YouTube videos often include captivating descriptions and intriguing thumbnails designed to increase the number of views, and thereby increase the revenue for the person who posted the video.
no code implementations • 9 Jul 2021 • Xinxin Yang, Mark Stamp
Low grade endometrial stromal sarcoma (LGESS) is rare form of cancer, accounting for about 0. 2% of all uterine cancer cases.
no code implementations • 4 Jul 2021 • Rakesh Nagaraju, Mark Stamp
In this research, we generate fake malware images using auxiliary classifier GANs (AC-GAN), and we consider the effectiveness of various techniques for classifying the resulting images.
no code implementations • 4 Jul 2021 • Lolitha Sresta Tupadha, Mark Stamp
Malware evolves over time and antivirus must adapt to such evolution.
no code implementations • 1 Jul 2021 • Jianwei Li, Han-Chih Chang, Mark Stamp
In this research, we consider the problem of verifying user identity based on keystroke dynamics obtained from free-text.
no code implementations • 1 Jul 2021 • Han-Chih Chang, Jianwei Li, Ching-Seh Wu, Mark Stamp
Keystroke dynamics can be used to analyze the way that users type by measuring various aspects of keyboard input.
no code implementations • 1 Jul 2021 • Han-Chih Chang, Jianwei Li, Mark Stamp
Keystroke dynamics can be used to analyze the way that a user types based on various keyboard input.
no code implementations • 24 Mar 2021 • Mugdha Jain, William Andreopoulos, Mark Stamp
In this paper, we conduct experiments to train and evaluate machine learning models for malware classification, based on features that can be obtained without disassembly or execution of code.
1 code implementation • 24 Mar 2021 • Pratikkumar Prajapati, Mark Stamp
In this paper, we consider malware classification using deep learning techniques and image-based features.
no code implementations • 7 Mar 2021 • Sunhera Paul, Mark Stamp
Malware detection is a critical aspect of information security.
no code implementations • 7 Mar 2021 • Samanvitha Basole, Mark Stamp
We perform clustering based on pairs of families and use the results to determine relationships between families.
no code implementations • 7 Mar 2021 • Aniket Chandak, Wendy Lee, Mark Stamp
We show that we can obtain better classification accuracy based on these feature embeddings, as compared to HMM experiments that directly use the opcode sequences, and serve to establish a baseline.
no code implementations • 7 Mar 2021 • Zidong Jiang, Fabio Di Troia, Mark Stamp
We employ the resulting techniques to develop and test a sentiment analysis approach for troll detection, based on a variety of machine learning strategies.
no code implementations • 7 Mar 2021 • Andy Phung, Mark Stamp
In this chapter, we evaluate numerous adversarial techniques for the purpose of attacking deep learning-based image spam classifiers.
1 code implementation • 7 Mar 2021 • Mark Stamp, Aniket Chandak, Gavin Wong, Allen Ye
Our common framework and empirical results are an effort to bring some sense of order to the chaos that is evident in the evolving field of ensemble learning -- both within the narrow confines of the malware analysis problem, and in the larger realm of machine learning in general.
no code implementations • 3 Mar 2021 • Aparna Sunil Kale, Fabio Di Troia, Mark Stamp
Malware classification is an important and challenging problem in information security.
no code implementations • 3 Mar 2021 • Dennis Dang, Fabio Di Troia, Mark Stamp
We find that a model consisting of word embedding, biLSTMs, and CNN layers performs best in our malware classification experiments.
no code implementations • 3 Mar 2021 • Jing Zhao, Samanvitha Basole, Mark Stamp
Discrete hidden Markov models (HMM) are often applied to malware detection and classification problems.
1 code implementation • 21 Jan 2019 • Niket Bhodia, Pratikkumar Prajapati, Fabio Di Troia, Mark Stamp
In this paper, we consider the problem of malware detection and classification based on image analysis.
no code implementations • 21 Jan 2019 • Neeraj Chavan, Fabio Di Troia, Mark Stamp
In this paper, we present a comparative analysis of benign and malicious Android applications, based on static features.
no code implementations • 6 Jan 2019 • Swapna Vemparala, Fabio Di Troia, Corrado A. Visaggio, Thomas H. Austin, Mark Stamp
In this paper, we explore the effectiveness of dynamic analysis techniques for identifying malware, using Hidden Markov Models (HMMs) and Profile Hidden Markov Models (PHMMs), both trained on sequences of API calls.