SlideShare a Scribd company logo
1 of 63
Download to read offline
Copyright	2018	Trend	Micro	Inc.
1
Role	of	ML	in	Security
Jonathan	Oliver
Copyright	2018	Trend	Micro	Inc.
2
“Use	Machine	Learning”
“Not	yet…”
Copyright	2018	Trend	Micro	Inc.
3
Cybercriminal
Business
Models
Copyright	2018	Trend	Micro	Inc.
4
2000s
How	to	monetize	a malware	infection Return
Spambot $
Banking	Trojan $$
Stealing	Intellectual	Property $$
Ransomware $$$
How	to	monetize	a malware	infection Return
Rent: Spambot /	DDOS $
Banking	Trojan $$
Stealing	Intellectual	Property $$
2014
Copyright	2018	Trend	Micro	Inc.
5
Changes	brought	about	by	Ransomware
Issue Pre	Ransomware
Type of	Solution Reactive	Solutions	were	
good	enough
Business Critical	
Problem:
FP	in	the	OS
Backup	Solutions Sophisticated
organizations	had	backup	
solutions
Copyright	2018	Trend	Micro	Inc.
6
Changes	brought	about	by	Ransomware
Issue Pre	Ransomware Post	Ransomware
Type of	Solution Reactive	Solutions	were	
good	enough
Time	Zero	Solutions	
required
=>	Adoption of	ML
Business Critical	
Problem:
FP	in	the	OS Ransomware infection
Backup	Solutions Sophisticated
organizations	had	backup	
solutions
Everyone	needs	backup	
solutions
Copyright	2018	Trend	Micro	Inc.
7
2015-2018:	New	Business	Models
Malware	Type Notes
Ransomware Has to	adapt	to	changing	defensive	
posture
Coinmining Up	and	down	with	value	of	
cryptocurrencies
InfoStealer Can	be	first	stage	of	other	attacks	
(ransomware)
Copyright	2018	Trend	Micro	Inc.
8
ML	/	AI
A	Silver	Bullet?
Copyright	2018	Trend	Micro	Inc.
9
Copyright	2015	Trend	Micro	Inc.					 9
No	silver	bullets
Industry	Perspective
Copyright	2018	Trend	Micro	Inc.
10
10
Academic	Perspective
Copyright	2018	Trend	Micro	Inc.
11
2011
Copyright	2018	Trend	Micro	Inc.
12
2016
Copyright	2018	Trend	Micro	Inc.
13
2016
2017
Copyright	2018	Trend	Micro	Inc.
14
Advance System Game Requirements
1997 Deep	
Blue
Chess Strategy.	Looking	ahead.
Each	piece	has	its	own	rules.
Very	complex
2011 Watson Jeopardy Can	be	about	anything.
Open ended.
2016 AlphaGo Go Amazingly	complex
Every piece	is	identical
2017 Libratus Poker Bluffing.	Lack	of	Knowledge.
S
E
C
U
R
I
T
Y
Copyright	2018	Trend	Micro	Inc.
15
Role	of	ML	and	AI	in	Security
Creating	an	attack	surface	which
1. Is	difficult	to	attack
2. Can	be	maintained
Copyright	2018	Trend	Micro	Inc.
16
Attack	Surface	~
ML	Decision	Surface
In	ML	process,	
selected	during	
training	/	testing
https://www.kdnuggets.com/2015/06/decision-boundaries-deep-
learning-machine-learning-classifiers.html
Copyright	2018	Trend	Micro	Inc.
17
Machine	Learning
Life	Cycle
Copyright	2018	Trend	Micro	Inc.
18
Machine	Learning	Life	Cycle
Identify	
Problem
Data	
Collection	
/	Cleaning
Train	/	
Test
Implement	/	
Dev
Maintain
Copyright	2018	Trend	Micro	Inc.
19
Issue	1:	Training	/	Algorithm	Selection
Traditional	Approach
1. Split	the	dataset	into	2	(say	70%/30%)
2. Train	on	70%
3. Test	on	30%	select	the	model	with	best	results
Can	result	in	complex	models	or	ensemble	models…
Copyright	2018	Trend	Micro	Inc.
20
Copyright	2018	Trend	Micro	Inc.
21
The	Problem
Wide	gap	between	testing	and	real	world	results.
Discussed	at	anti-spam	conferences
• CEAS
• MIT	spam	conference
But	not	addressed
Lorenzo	Cavallaro ‘inflated	results’	(MRE	2018)
Copyright	2018	Trend	Micro	Inc.
22
How	wide	a	gap?
Anti-spam	Benchmarks:	 97%-98%
Anti-spam	Published	 Results:	 99%+	(up	to	99.87%)
Copyright	2018	Trend	Micro	Inc.
23
Copyright	2018	Trend	Micro	Inc.
24
What	is	Going	Wrong?
Malicious	events	typically	come	in	clusters:
“Outbreaks”
And	this	has	important	impact	in	Training	/	Test
ML	is	very	effective	within	clusters
ML	is	less	effective	at	generalizing	from	one	cluster	to	
other	clusters
Copyright	2018	Trend	Micro	Inc.
25
xx
x
Copyright	2018	Trend	Micro	Inc.
26
Demo
Hierarchical	clustering	of	malware	(5	million	files)
Distance	metric:	TLSH
Daisuke	Inoue
“Massiveness	reveals	new	insights”
3,749,768	/	5,000,000	(75%)	were	clustered
Copyright	2018	Trend	Micro	Inc.
27
Distance	metric:	TLSH
https://github.com/trendmicro/tlsh
Uses	byte	level	features	(ngram-like	2skip-5gram)
4ED2054D3AA64922C2BDAB7848F5834102F282130527D7EF4CC9ACE55B772D40640DE4
File	1 File	2
TLSH
Distance
Copyright	2018	Trend	Micro	Inc.
28
Tight	clusters	using	byte	level	features
Members	of	a	cluster	are	very	likely	to	have	similar	
feature	vectors	(or	identical	feature	vectors)
Lets	look	at	malware	clusters
Copyright	2018	Trend	Micro	Inc.
29
xx
x
Copyright	2018	Trend	Micro	Inc.
30
Conclusion	Issue	1
For	the	purposes	of	the	traditional	train/test	split
Security	is	different	than	many	other	tasks
A	key	task	for	security	is	to	generalise	beyond	clusters	
to	related	clusters
More	thorough	train/test	protocols	need	to	be	used.
Time	based	testing
Copyright	2018	Trend	Micro	Inc.
31
Observations	of	ML	Life	Cycle
Considerations	from	later	in	the	life	cycle	may	impact	
steps	earlier	in	the	ML	life	cycle
Copyright	2018	Trend	Micro	Inc.
32
Machine	Learning	Life	Cycle
Identify	
Problem
Data	
Collection	
/	Cleaning
Train	/	
Test
Implement	/	
Dev
Maintain
Missed	detections
FPs
Retraining
Attacks	on	ML
Maintenance	
considerations	
impact	on	
algorithm	selection
Copyright	2018	Trend	Micro	Inc.
33
Maintenance:	Issue	2	Retraining
• We	collect	errors
• Missed	detections
• False	positives
⇒ Retrain
• Standard	ML	retraining	will	typically	change	a	
decision	surface	in	unexpected	ways
Copyright	2018	Trend	Micro	Inc.
34
Maintenance:	Decision	Surfaces
Before	Retraining After	Retraining
Customer	has	
samples	here
Copyright	2018	Trend	Micro	Inc.
35
Issue	2:	retraining
• Simple	models	(such	linear	models)	can	be	
modified	in	ways	that	guarantee	new	unexpected	
FPs	will	not	be	created.
• Further	research	that	guarantees	that	un-related	
FPs	will	not	be	created
Copyright	2018	Trend	Micro	Inc.
36
Maintenance	Requirements	for	Security
• False	Alarms	/	False	Positives	are	a	big	deal
• Need	to	be	explained
Copyright	2018	Trend	Micro	Inc.
37
Demo
Look	at	mixed	clusters	that	need	explaining
Copyright	2018	Trend	Micro	Inc.
38
Attacking	ML/AI
Copyright	2018	Trend	Micro	Inc.
39
Source:	“Intriguing	 properties	of	Neural	Networks”,	 Szegedy et	al.,	Feb	2014,	https://arxiv.org/pdf/1312.6199.pdf
ML	tricked	to	recognize	right-hand	photos	as	an	ostrich
Copyright	2018	Trend	Micro	Inc.
40
Attacking	ML
NIPS	competition	2017
• Gradient	descent	attacks
• …
https://arxiv.org/pdf/1804.00097.pdf
Copyright	2018	Trend	Micro	Inc.
41
Copyright	2018	Trend	Micro	Inc.
42
Underlying	Issues
White	Box	Attacks	(access	ML	model)	versus
Black	Box	Attacks	(access	to	ML	results)
Issue	3:	Where	should	ML	reside?
• In	the	Cloud?
• On	the	endpoint?
Copyright	2018	Trend	Micro	Inc.
43
ML	on	the	client
Extract	Features
Check	model
Make	decision
Backend	Server
model
file
Copyright	2018	Trend	Micro	Inc.
44
ML	in	the	Cloud
Extract	
Features
Backend	Server
Check	ML	model
Make	decision
features
decision
file
Copyright	2018	Trend	Micro	Inc.
45
Title
xxx
Copyright	2018	Trend	Micro	Inc.
47
Issue	3:	Where	should	ML	reside?
Issues:
• Working	on	air-gapped	systems
– Airgapped systems	are	a	minority	of	servers
• What	happens	when	ML	is	attacked
– Ease	of	Attack?
– Updating	ML	models
Copyright	2018	Trend	Micro	Inc.
48
Alternatives:	Hybrid	ML
ML	model	on	the	client	– identifies	most	malware	
at	time	zero
ML	model	in	the	cloud	– for	malware	which	is	
evading	ML
Copyright	2018	Trend	Micro	Inc.
49
Extra	Topic:
Combining	ML	and	
Traditional	Security
Copyright	2018	Trend	Micro	Inc.
50
False	Positives
• Typical	anti-malware	might	scan	30,000	files	per	day	(approx)
• So	if	we	processed	all	files	with	ML	– then	even	a	1/30,000	FP	
would	be	very	bad
• 1	in	a	million	FP	rate	would	result	in	a	FP	every	33	days
⇒So	we	sort	out	the	good	files	as	well
Copyright	2018	Trend	Micro	Inc.
51
FPs	in	OS…
Copyright	2018	Trend	Micro	Inc.
52
Web	&	File	Reputation
Exploit	Prevention
Application	Control
Variant	Protection
Behavioral	Analysis
Pre-execution	Machine	Learning
LEGEND
Known	
Good	Data
Known	
Bad	Data
Unknown	
Data
Noise	
Cancellation
Runtime	Machine	Learning
The	Right	Technique	
At	The	Right	Time
30,000	files
per	day
30	files
per	day
Copyright	2018	Trend	Micro	Inc.
53
Interaction	ML	
Ideally	our	traditional	security	results	in	ML	that	focusses	on	the	
most	suspicious	files:
– Web	downloads
– Executable	files	in	Emails
– Executable	files	from	USB
– Executable	files	dropped	by	unexpected	processes	(like	
SMB)
– …
Copyright	2018	Trend	Micro	Inc.
54
Interaction	ML	
Sandboxes	are	really	useful…
Ideally	we	want	to	sandbox	
the	entire	internet…
(many	many	files)
Use	ML	/	Clustering	to	select	
samples	that	go	in	the	
sandbox…
Copyright	2018	Trend	Micro	Inc.
55
Conclusion
Training	/	Testing	protocols
Retraining	impact	on	decision	surfaces
Intelligent	interaction
• Traditional	Security	and	ML	/	AI
Copyright	2018	Trend	Micro	Inc.
56
Backup
Slides
Copyright	2018	Trend	Micro	Inc.
57
Demo	of	Evolutionary	Tree
Data:	5,000,000	samples
Timing
1	hour	to	cluster	(optimized	algorithms)
5	hours	to	create	trees	(needs	to	use	optimized	algorithms)
Key	Feature:	Automatically	created	index	into	5	million	files
Copyright	2018	Trend	Micro	Inc.
58
Summary	of	Clustering
Found	288131	tight	clusters	(T=30)
Samples Clustered
Not	
clustered
Percent	
Clustered
Good 3138792 2575823 562969 82.06%
Malware 1861208 1173945 687263 63.07%
Total 5000000 3749768 1250232 75.00%
Copyright	2018	Trend	Micro	Inc.
59
TLSH	– Versions	of	Chrome
TLSH Chrome
version
09159c11f085c0b3e56311b2c869ba34427cbe68832655db639c7e1a2db47d2363b7db 55.0.2877.0
10159c11f085c0b7d57201b1d87ab775067cbc28832681db73a87e1a3eb47d2267b69b 55.0.2882.4
94158d51f0858077e57210b2d8bdba30427cbd68432a65db63987d1a3db47d23a3b6cb 56.0.2899.0
88159e51f045c1b7e5b31071d8b9bb71067cad28431691db6398be2a3db03d22e3b69b 57.0.2957.1
2b158d11f045c1b7e5b310b1d8b9bb75057cad28831691db6398be1a3db03d22e3b69b 57.0.2966.0
12158d12f485c077e5b210b1d8bd7a34427cbd28432655db63987d2a2eb43d13a3badb 57.0.2975.1
cb159e11f049c1b7d5b211b1d87dba31467cbc28832a41db63d87e1a3db47d22a3b69b 57.0.2978.4
c4159d11f445c1b7d5b211b2d47dba71467cbc28832a40db63987e1a3eb43d22a3b6db 57.0.2987.4
50159d12f081c177e9721072d8bd7a34467cad28432655db63987e1a3eb43d13a3badb 58.0.3012.1
Copyright	2018	Trend	Micro	Inc.
60
The	distance	between	2	versions	of	Chrome
chrome.exe
SHA256:c70b8cbb2ac962b343535454e4f2bcb3e48d83a04792c64bc768d59b3c1bf403
1c159d11f445c1b7e5b211b2d879ba71467cbc28832641db63987e1a3db03d23a3b6db
c4159d11f445c1b7d5b211b2d47dba71467cbc28832a40db63987e1a3eb43d22a3b6db
chrome.exe
SHA256:723aa4a407160bd99430de690f1f0d34af4a6622e2c44fe95be3bda3d7c344b3
Copyright	2018	Trend	Micro	Inc.
61
Distance	calculation
1c159d11f445c1b7e5b211b2d879ba71467cbc28832641db63987e1a3db03d23a3b6db
c4159d11f445c1b7d5b211b2d47dba71467cbc28832a40db63987e1a3eb43d22a3b6db
1 1 2 1 2 1 1
8: 1000 6: 0110
4: 0100 a: 1010
Ham(8,4)=2 Ham(6,a)=2
⇒Distance = 9
Copyright	2018	Trend	Micro	Inc.
62
How	Good	a	Ruler	is	TLSH?
For	Security	Applications,	we	did	a	study	across
• Executable	files
• HTML	files
• Text	files
• JavaScript	files
• Image	files
• Source	code	files
• …
To	evaluate	how	well	the	distance	matches,	we	use	a	ROC	curve
Copyright	2018	Trend	Micro	Inc.
63
How	Good	a	Ruler	is	TLSH:	ROC	Curve
https://github.com/trendmicro/tlsh/blob/master/TLSH_CTC_final.pdf

More Related Content

Similar to 2019 TrustCom: The role of ML and AI in Security

Trend Micro 10 Minute Overview
Trend Micro 10 Minute OverviewTrend Micro 10 Minute Overview
Trend Micro 10 Minute OverviewJohn D. Haden
 
Top 5 Famous Cyberattacks Of The World | SOCVault
Top 5 Famous Cyberattacks Of The World | SOCVaultTop 5 Famous Cyberattacks Of The World | SOCVault
Top 5 Famous Cyberattacks Of The World | SOCVaultSOCVault
 
BlueHat v18 || Modern day entomology - examining the inner workings of the bu...
BlueHat v18 || Modern day entomology - examining the inner workings of the bu...BlueHat v18 || Modern day entomology - examining the inner workings of the bu...
BlueHat v18 || Modern day entomology - examining the inner workings of the bu...BlueHat Security Conference
 
Ransomware- A reality check (Part 1).pptx
Ransomware- A reality check (Part 1).pptxRansomware- A reality check (Part 1).pptx
Ransomware- A reality check (Part 1).pptxInfosectrain3
 
Ivanti Threat Thursday for December 2019
Ivanti Threat Thursday for December 2019Ivanti Threat Thursday for December 2019
Ivanti Threat Thursday for December 2019Ivanti
 
Valuing Data in the Age of Ransomware
Valuing Data in the Age of Ransomware Valuing Data in the Age of Ransomware
Valuing Data in the Age of Ransomware IBM Security
 
Panda Adaptive Defense 360 - Cyber Extortion Guide
Panda Adaptive Defense 360 - Cyber Extortion GuidePanda Adaptive Defense 360 - Cyber Extortion Guide
Panda Adaptive Defense 360 - Cyber Extortion GuidePanda Security
 
Cybersecurity Myths for Small and Medium-Sized Businesses
Cybersecurity Myths for Small and Medium-Sized BusinessesCybersecurity Myths for Small and Medium-Sized Businesses
Cybersecurity Myths for Small and Medium-Sized BusinessesSeqrite
 
Aon Ransomware Response and Mitigation Strategies
Aon Ransomware Response and Mitigation StrategiesAon Ransomware Response and Mitigation Strategies
Aon Ransomware Response and Mitigation StrategiesCSNP
 
The Role of Backup and Recovery in the New Ransomware Economy
The Role of Backup and Recovery in the New Ransomware EconomyThe Role of Backup and Recovery in the New Ransomware Economy
The Role of Backup and Recovery in the New Ransomware EconomyMSP360
 
Ransomware and email security ver - 1.3
Ransomware and email security   ver - 1.3Ransomware and email security   ver - 1.3
Ransomware and email security ver - 1.3Denise Bailey
 
TrendLabs 2012 Annual Security Roundup: Evolved Threats in a “Post-PC” World
TrendLabs 2012 Annual Security Roundup: Evolved Threats in a “Post-PC” WorldTrendLabs 2012 Annual Security Roundup: Evolved Threats in a “Post-PC” World
TrendLabs 2012 Annual Security Roundup: Evolved Threats in a “Post-PC” WorldInfinigate Group
 
PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018
PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018
PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018Panda Security
 
Netwatcher Credit Union Tech Talk
Netwatcher Credit Union Tech TalkNetwatcher Credit Union Tech Talk
Netwatcher Credit Union Tech TalkNetWatcher
 

Similar to 2019 TrustCom: The role of ML and AI in Security (20)

What's the cause behind the rise in RANSOMWARE attacks?
What's the cause behind the rise in RANSOMWARE attacks?What's the cause behind the rise in RANSOMWARE attacks?
What's the cause behind the rise in RANSOMWARE attacks?
 
Trend Micro 10 Minute Overview
Trend Micro 10 Minute OverviewTrend Micro 10 Minute Overview
Trend Micro 10 Minute Overview
 
Top 5 Famous Cyberattacks Of The World | SOCVault
Top 5 Famous Cyberattacks Of The World | SOCVaultTop 5 Famous Cyberattacks Of The World | SOCVault
Top 5 Famous Cyberattacks Of The World | SOCVault
 
BlueHat v18 || Modern day entomology - examining the inner workings of the bu...
BlueHat v18 || Modern day entomology - examining the inner workings of the bu...BlueHat v18 || Modern day entomology - examining the inner workings of the bu...
BlueHat v18 || Modern day entomology - examining the inner workings of the bu...
 
Ransomware- A reality check (Part 1).pptx
Ransomware- A reality check (Part 1).pptxRansomware- A reality check (Part 1).pptx
Ransomware- A reality check (Part 1).pptx
 
Ivanti Threat Thursday for December 2019
Ivanti Threat Thursday for December 2019Ivanti Threat Thursday for December 2019
Ivanti Threat Thursday for December 2019
 
Threat Landscape Lessons from IoTs and Honeynets
Threat Landscape Lessons from IoTs and Honeynets Threat Landscape Lessons from IoTs and Honeynets
Threat Landscape Lessons from IoTs and Honeynets
 
Valuing Data in the Age of Ransomware
Valuing Data in the Age of Ransomware Valuing Data in the Age of Ransomware
Valuing Data in the Age of Ransomware
 
Panda Adaptive Defense 360 - Cyber Extortion Guide
Panda Adaptive Defense 360 - Cyber Extortion GuidePanda Adaptive Defense 360 - Cyber Extortion Guide
Panda Adaptive Defense 360 - Cyber Extortion Guide
 
Understanding ransomware
Understanding ransomwareUnderstanding ransomware
Understanding ransomware
 
Understanding ransomware
Understanding ransomwareUnderstanding ransomware
Understanding ransomware
 
Cybersecurity Myths for Small and Medium-Sized Businesses
Cybersecurity Myths for Small and Medium-Sized BusinessesCybersecurity Myths for Small and Medium-Sized Businesses
Cybersecurity Myths for Small and Medium-Sized Businesses
 
Aon Ransomware Response and Mitigation Strategies
Aon Ransomware Response and Mitigation StrategiesAon Ransomware Response and Mitigation Strategies
Aon Ransomware Response and Mitigation Strategies
 
What Businesses Entrepreneurs Are Imperative To Know About Ransomware
What Businesses Entrepreneurs Are Imperative To Know About RansomwareWhat Businesses Entrepreneurs Are Imperative To Know About Ransomware
What Businesses Entrepreneurs Are Imperative To Know About Ransomware
 
The Role of Backup and Recovery in the New Ransomware Economy
The Role of Backup and Recovery in the New Ransomware EconomyThe Role of Backup and Recovery in the New Ransomware Economy
The Role of Backup and Recovery in the New Ransomware Economy
 
Funsec3e ppt ch11
Funsec3e ppt ch11Funsec3e ppt ch11
Funsec3e ppt ch11
 
Ransomware and email security ver - 1.3
Ransomware and email security   ver - 1.3Ransomware and email security   ver - 1.3
Ransomware and email security ver - 1.3
 
TrendLabs 2012 Annual Security Roundup: Evolved Threats in a “Post-PC” World
TrendLabs 2012 Annual Security Roundup: Evolved Threats in a “Post-PC” WorldTrendLabs 2012 Annual Security Roundup: Evolved Threats in a “Post-PC” World
TrendLabs 2012 Annual Security Roundup: Evolved Threats in a “Post-PC” World
 
PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018
PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018
PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018
 
Netwatcher Credit Union Tech Talk
Netwatcher Credit Union Tech TalkNetwatcher Credit Union Tech Talk
Netwatcher Credit Union Tech Talk
 

More from JonathanOliver26

HACT_Fast_Search_COINS_pub.pdf
HACT_Fast_Search_COINS_pub.pdfHACT_Fast_Search_COINS_pub.pdf
HACT_Fast_Search_COINS_pub.pdfJonathanOliver26
 
Using lexigraphical distancing to block spam
Using lexigraphical distancing to block spamUsing lexigraphical distancing to block spam
Using lexigraphical distancing to block spamJonathanOliver26
 
Introduction to MML and Supervised Learning
Introduction to MML and Supervised LearningIntroduction to MML and Supervised Learning
Introduction to MML and Supervised LearningJonathanOliver26
 
Privacy solutions decode2021_jon_oliver
Privacy solutions decode2021_jon_oliverPrivacy solutions decode2021_jon_oliver
Privacy solutions decode2021_jon_oliverJonathanOliver26
 

More from JonathanOliver26 (7)

blackhole.pdf
blackhole.pdfblackhole.pdf
blackhole.pdf
 
HACT_Fast_Search_COINS_pub.pdf
HACT_Fast_Search_COINS_pub.pdfHACT_Fast_Search_COINS_pub.pdf
HACT_Fast_Search_COINS_pub.pdf
 
2021_TLSH_SOC_pub.pdf
2021_TLSH_SOC_pub.pdf2021_TLSH_SOC_pub.pdf
2021_TLSH_SOC_pub.pdf
 
Using lexigraphical distancing to block spam
Using lexigraphical distancing to block spamUsing lexigraphical distancing to block spam
Using lexigraphical distancing to block spam
 
Introduction to MML and Supervised Learning
Introduction to MML and Supervised LearningIntroduction to MML and Supervised Learning
Introduction to MML and Supervised Learning
 
Privacy solutions decode2021_jon_oliver
Privacy solutions decode2021_jon_oliverPrivacy solutions decode2021_jon_oliver
Privacy solutions decode2021_jon_oliver
 
Privacy log files
Privacy log filesPrivacy log files
Privacy log files
 

Recently uploaded

Call girls Service Canacona - 8250092165 Our call girls are sure to provide y...
Call girls Service Canacona - 8250092165 Our call girls are sure to provide y...Call girls Service Canacona - 8250092165 Our call girls are sure to provide y...
Call girls Service Canacona - 8250092165 Our call girls are sure to provide y...MOHANI PANDEY
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrHenryBriggs2
 
Research Assignment - NIST SP800 [172 A] - Presentation.pptx
Research Assignment - NIST SP800 [172 A] - Presentation.pptxResearch Assignment - NIST SP800 [172 A] - Presentation.pptx
Research Assignment - NIST SP800 [172 A] - Presentation.pptxi191686
 
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime NagercoilNagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoilmeghakumariji156
 
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理AS
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制pxcywzqs
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查ydyuyu
 
一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理F
 
Local Call Girls in Gomati 9332606886 HOT & SEXY Models beautiful and charmi...
Local Call Girls in Gomati  9332606886 HOT & SEXY Models beautiful and charmi...Local Call Girls in Gomati  9332606886 HOT & SEXY Models beautiful and charmi...
Local Call Girls in Gomati 9332606886 HOT & SEXY Models beautiful and charmi...Sareena Khatun
 
Down bad crying at the gym t shirtsDown bad crying at the gym t shirts
Down bad crying at the gym t shirtsDown bad crying at the gym t shirtsDown bad crying at the gym t shirtsDown bad crying at the gym t shirts
Down bad crying at the gym t shirtsDown bad crying at the gym t shirtsrahman018755
 
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac RoomVip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Roommeghakumariji156
 
Call girls Service in Ajman 0505086370 Ajman call girls
Call girls Service in Ajman 0505086370 Ajman call girlsCall girls Service in Ajman 0505086370 Ajman call girls
Call girls Service in Ajman 0505086370 Ajman call girlsMonica Sydney
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样ayvbos
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdfMatthew Sinclair
 
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...meghakumariji156
 
一比一原版帝国理工学院毕业证如何办理
一比一原版帝国理工学院毕业证如何办理一比一原版帝国理工学院毕业证如何办理
一比一原版帝国理工学院毕业证如何办理F
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirtrahman018755
 

Recently uploaded (20)

Call girls Service Canacona - 8250092165 Our call girls are sure to provide y...
Call girls Service Canacona - 8250092165 Our call girls are sure to provide y...Call girls Service Canacona - 8250092165 Our call girls are sure to provide y...
Call girls Service Canacona - 8250092165 Our call girls are sure to provide y...
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
 
Research Assignment - NIST SP800 [172 A] - Presentation.pptx
Research Assignment - NIST SP800 [172 A] - Presentation.pptxResearch Assignment - NIST SP800 [172 A] - Presentation.pptx
Research Assignment - NIST SP800 [172 A] - Presentation.pptx
 
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime NagercoilNagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
 
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
 
一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理
 
Local Call Girls in Gomati 9332606886 HOT & SEXY Models beautiful and charmi...
Local Call Girls in Gomati  9332606886 HOT & SEXY Models beautiful and charmi...Local Call Girls in Gomati  9332606886 HOT & SEXY Models beautiful and charmi...
Local Call Girls in Gomati 9332606886 HOT & SEXY Models beautiful and charmi...
 
Down bad crying at the gym t shirtsDown bad crying at the gym t shirts
Down bad crying at the gym t shirtsDown bad crying at the gym t shirtsDown bad crying at the gym t shirtsDown bad crying at the gym t shirts
Down bad crying at the gym t shirtsDown bad crying at the gym t shirts
 
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac RoomVip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
 
Call girls Service in Ajman 0505086370 Ajman call girls
Call girls Service in Ajman 0505086370 Ajman call girlsCall girls Service in Ajman 0505086370 Ajman call girls
Call girls Service in Ajman 0505086370 Ajman call girls
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
 
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
 
一比一原版帝国理工学院毕业证如何办理
一比一原版帝国理工学院毕业证如何办理一比一原版帝国理工学院毕业证如何办理
一比一原版帝国理工学院毕业证如何办理
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
 

2019 TrustCom: The role of ML and AI in Security