SlideShare a Scribd company logo
Pa#ern 
Recogni-on 
and 
Applica-ons 
Lab 
Poisoning Behavioral Malware Clustering 
University 
of 
Cagliari, 
Italy 
Department 
of 
Electrical 
and 
Electronic 
Engineering 
Ba#sta 
Biggio1, 
Konrad 
Rieck2, 
Davide 
Ariu1, 
Chris-an 
Wressnegger2, 
Igino 
Corona1, 
Giorgio 
Giacinto1, 
and 
Fabio 
Roli1 
(1) 
University 
of 
Cagliari 
(IT) 
(2) 
University 
of 
GoeLngen 
(GE) 
Sco#sdale, 
Arizona, 
AISec 
2014 
US, 
Nov., 
7 
2014
Threats and Attacks in Computer Security 
• Huge number of devices, services and apps on the Internet 
– Vulnerabilities in code, services, apps, etc. 
• Attacks through malicious software (malware) 
– Botnets, spam, identity theft / stolen credit card numbers 
• Manual analysis and crafting of signatures costly 
– Need for automated / assisted detection (and rule generation) 
– Machine learning-based defenses (data clustering) 
http://pralab.diee.unica.it 
2 
Evasion: malware families / variants 
+65% new malware variants from 2012 to 2013 
Mobile Adware & Malw. Analysis, Symantec, 2014 
Detection: antivirus systems 
Rule-based systems
Data Clustering for Computer Security 
• Goal: clustering of malware families to identify common 
characteristics and design suitable countermeasures 
• e.g., antivirus rules / signatures 
http://pralab.diee.unica.it 
3 
xx 
x 
x 
x 
x 
x 
x 
x 
x 
x 
x 
x 
x 
x 
x 
x 
x1 
x2 
... 
xd 
feature extraction 
(e.g., executed 
instructions, 
system calls, etc.) 
clustering of 
malware families 
(e.g., similar program 
behavior) 
for 
each 
cluster 
if 
… 
then 
… 
else 
… 
data analysis / 
countermeasure design 
(e.g., signature generation) 
data collection 
(honeypots) 
Malware samples
Is Data Clustering Secure? 
• Attackers can poison input data to subvert malware clustering 
http://pralab.diee.unica.it 
4 
x 
x 
x 
x 
x 
x 
x 
x 
x 
x 
x 
x 
x 
x 
x 
x 
x 
x1 
x2 
... 
xd 
feature extraction 
(e.g., executed 
instructions, 
system calls, etc.) 
Malware samples designed 
to subvert clustering 
… is significantly 
compromised 
for 
each 
cluster 
if 
… 
then 
… 
else 
… 
… becomes 
useless (too many 
false alarms, low 
detection rate) 
(1) B. Biggio et al. Is data clustering in adversarial settings secure? In AISec 2013 
(2) B. Biggio et al.. Poisoning complete-linkage hierarchical clustering, In S+SSPR 2014 
data collection 
(honeypots) 
clustering of 
malware families 
(e.g., similar program 
behavior) 
data analysis / 
countermeasure design 
(e.g., signature generation)
Is Data Clustering Secure? 
• Our previous work (1,2): 
– Framework for security evaluation of clustering algorithms 
– Formalization of poisoning attacks (optimization) against 
single- and complete-linkage hierarchical clustering 
• In this work we focus on a realistic application example on 
http://pralab.diee.unica.it 
5 
Poisoning 
a,acks 
against 
a 
behavioral 
malware 
clustering 
approach 
(3) 
Malheur 
h,p://www.mlsec.org/malheur/ 
(1) B. Biggio et al.. Is data clustering in adversarial settings secure? In AISec 2013 
(2) B. Biggio et al.. Poisoning complete-linkage hierarchical clustering. In S+SSPR 2014 
(3) K. Rieck et al.. Automatic analysis of malware behavior using machine learning. JCS 2011
Poisoning Attacks 
• Goal: to maximally compromise the clustering output on D 
• Capability: adding m attack samples 
• Knowledge: perfect / worst-case attack 
• Attack strategy: 
x 
http://pralab.diee.unica.it 
6 
max 
A 
m 
dc (Y,Y!(A)), A= ai { }i=1 
Distance between the clustering in the absence of attack and that under attack 
Y! = fD(D∪A) 
x 
x 
x 
x 
x 
x 
x 
x 
x 
x 
x 
x 
x 
x 
x 
Attack samples A 
Y = f (D) 
x 
x 
x 
x 
x 
x 
x 
x 
x 
x 
x 
x 
Clustering on untainted data D 
(1) B. Biggio et al. Is data clustering in adversarial settings secure? In AISec 2013 
(2) B. Biggio et al.. Poisoning complete-linkage hierarchical clustering, In S+SSPR 2014
Poisoning Attacks 
dc (Y,Y!) = YY T −Y!Y!T 
http://pralab.diee.unica.it 
7 
F 
m 
, Y = 
%%%%%% & 
1 0 0 
0 0 1 
0 0 1 
1 0 0 
0 1 0 
# 
$ 
(((((( 
, YY T = 
' 
1 0 0 1 0 
0 1 1 0 0 
0 1 1 0 0 
1 0 0 1 0 
0 0 0 0 1 
# 
%%%%%% 
$ 
This distance counts how many pairs of samples have been clustered 
together in one clustering and not in the other, and vice-versa 
& 
(((((( 
' 
For a given clustering: 
Sample 1 
… 
Sample 5 
max 
A 
dc (Y,Y!(A)), A= ai { }i=1 
(1) B. Biggio et al. Is data clustering in adversarial settings secure? In AISec 2013 
(2) B. Biggio et al.. Poisoning complete-linkage hierarchical clustering, In S+SSPR 2014
Single-Linkage Hierarchical Clustering 
• Bottom-up agglomerative clustering 
– each point is initially considered as a cluster 
– closest clusters are iteratively merged 
• Linkage criterion to define distance between clusters 
– single-linkage criterion 
x 
x 
• Clustering output is a hierarchy of clusterings 
– Criterion needed to select a given clustering (e.g., number of clusters) 
– Cutoff threshold on the maximum intra-cluster distance 
http://pralab.diee.unica.it 
8 
x 
dist(Ci,Cj ) = min 
a∈Ci , b∈Cj 
d(a, b) x 
x 
x 
x 
x 
(1) B. Biggio et al. Is data clustering in adversarial settings secure? In AISec 2013 
(2) B. Biggio et al.. Poisoning complete-linkage hierarchical clustering, In S+SSPR 2014
Poisoning Single-Linkage Clustering 
• Attack strategy: 
• Heuristic-based solutions 
m 
– Greedy approach: adding one attack sample at a time 
– Bridge-based heuristics: local maxima are found in between the 
closest points of adjacent clusters 
http://pralab.diee.unica.it 
9 
max 
A 
dc (Y,Y!(A)), A= ai { }i=1 
(1) B. Biggio et al. Is data clustering in adversarial settings secure? In AISec 2013 
(2) B. Biggio et al.. Poisoning complete-linkage hierarchical clustering, In S+SSPR 2014
Poisoning Single-Linkage Clustering 
http://pralab.diee.unica.it 
10 
• Underlying idea: bridging the closest clusters 
– Given K clusters, K-1 candidate attack points 
Candidate attack points 
(1) B. Biggio et al. Is data clustering in adversarial settings secure? In AISec 2013 
(2) B. Biggio et al.. Poisoning complete-linkage hierarchical clustering, In S+SSPR 2014
Poisoning Single-Linkage Clustering 
1. Bridge (Best): evaluates Y’(a) for each candidate attack, 
retaining the best one 
– Clustering is run for each candidate attack point 
2. Bridge (Hard): estimates Y’(a) assuming that each candidate will 
split the corresponding cluster, potentially merging it with a 
fragment of the closest cluster 
– It does not require running clustering to find the best attack point 
3. Bridge (Soft): estimates Y’(a) as Bridge (Hard), but using a soft 
probabilistic estimate instead of 0/1 sample-to-cluster 
assignments 
– It does not require running clustering to find the best attack point 
http://pralab.diee.unica.it 
11 
(1) B. Biggio et al. Is data clustering in adversarial settings secure? In AISec 2013 
(2) B. Biggio et al.. Poisoning complete-linkage hierarchical clustering, In S+SSPR 2014
Poisoning Single-Linkage Clustering 
• The attack compromises the initial clustering by forming 
heterogeneous clusters 
http://pralab.diee.unica.it 
12 
Clustering on untainted data 
2.5 
Clustering after adding 20 attack samples 
2 
1.5 
1 
0.5 
0 
−0.5 
−1 
−1.5 
−2 
−2.5 
−2 −1.5 −1 −0.5 0 0.5 1 1.5 
(1) B. Biggio et al. Is data clustering in adversarial settings secure? In AISec 2013 
(2) B. Biggio et al.. Poisoning complete-linkage hierarchical clustering, In S+SSPR 2014
Malheur 
Behavioral Malware Clustering 
• Malware executed in a sandbox (e.g., virtual machine) 
– Monitoring of program behavior (instructions, system calls, etc.) 
• Embedding of malware behavior in feature space 
– Each feature denotes presence / absence of a given instruction 
– Each vector is normalized to unit Euclidean norm 
• Clustering using single-linkage (or other linkage variants) 
http://pralab.diee.unica.it 
13 
Filesystem 
copy file ‘a’ to ’b’ 
open file ’foo.txt’ 
Network 
ping host ’10.1.2.3’ 
listen on port ‘31337’ 
Registry 
set key ‘reboot’ to ‘1’ 
(level 1) 
14 
01 
| 
11 
04 
… 
02 
02 
| 
02 
02 
… 
0d 
01 
| 
03 
0a 
… 
03 
03 
| 
03 
01 
… 
03 
0a 
| 
11 
04 
… 
Sandbox 
MIST 
Instruction 
(opcode) 
arguments 
Feature space 
14 
01 
02 
02 
+ 
(1) K. Rieck et al.. Automatic analysis of malware behavior using machine learning. JCS 2011
Poisoning Malheur 
• Poisoning single-linkage hierarchical clustering 
• Problem: how to create bridge points in this feature space? 
– Binary-valued vectors normalized to unit Euclidean norm 
• Additional constraint on the manipulation of malware samples 
– Malware should be modified without affecting malicious functionality 
– Adding instructions after malware program execution 
– Feature values can be only incremented 
http://pralab.diee.unica.it 
14 
x1 = (1 1 0 0 0) 
x2 = (0 0 1 1 1) 
1.5 
1 
0.5 
0 
d(x,x 
) 
1 
d(x,x 
) 
2 
0 1 2 3 
number of added features 
x2 
14 
01 
02 
02 
+ 
+ 
+ 
Bridge point 
x1 
x x
Experimental Setup and Datasets 
• Setup 
– Data split into two portions of equal size T and S 
– T used for extracting instructions and setting the cutoff threshold 
– S used for performance evaluation 
– F-measure: agreement between clusters and malware families 
• Malheur data 
– 3131 malware samples collected in 2009 (publicly available) 
– 85 instructions / features (on average) 
– Cutoff distance (max. F-measure on T): 0.49 (on average) 
• Recent Malware data 
– 657 malware samples from most prominent families in 2013 
– 78 instructions / features (on average) 
– Cutoff distance (max. F-measure on T): 0.63 (on average) 
http://pralab.diee.unica.it 
15
Experimental Results (Malheur data) 
• Attack strategies 
– Bridge (Best/Hard/Soft), Random, Random (Best), F-measure (Best) 
• Results for Malheur data 
– Random-based attacks are not effective (high-dimensional space) 
– Bridging is effective / clusters are fused together (cutoff threshold is fixed) 
– F-measure decreases while maximizing distance between clusterings 
Random Random (Best) Bridge (Best) Bridge (Soft) Bridge (Hard) F−measure (Best) 
1600 
1400 
1200 
1000 
800 
600 
400 
200 
0 
http://pralab.diee.unica.it 
16 
100 
10 20 30 40 50 60 70 80 
0% 2% 5% 7% 9% 11%13%15%17%18%20% 
Objective function 
90 
80 
70 
60 
50 
40 
30 
20 
10 
0% 2% 5% 7% 9% 11% 13% 15% 17% 18% 20% 
F−measure 
Fraction of poisoning attacks
Experimental Results (Recent Malware data) 
• Attack strategies 
– Bridge (Best/Hard/Soft), Random, Random (Best), F-measure (Best) 
• Results for Recent Malware data 
– Random-based attacks are not effective (high-dimensional space) 
– Bridging is effective / clusters are fused together (cutoff threshold is fixed) 
– F-measure decreases while maximizing distance between clusterings 
Random Random (Best) Bridge (Best) Bridge (Soft) Bridge (Hard) F−measure (Best) 
300 
250 
200 
150 
100 
50 
0 
http://pralab.diee.unica.it 
17 
72 
10 20 30 40 50 60 70 80 
0% 2% 5% 7% 9% 11%13%15%16%18%20% 
Objective function 
70 
68 
66 
64 
62 
60 
58 
56 
54 
52 
0% 2% 5% 7% 9% 11%13%15%16%18%20% 
F−measure 
Fraction of poisoning attacks
Conclusions and Future Work 
• Poisoning attacks can subvert behavioral malware clustering 
• Future work 
– Extensions to other clustering algorithms, common attack strategy 
• e.g., black-box optimization with suitable heuristics 
– Attacks with limited knowledge of the data / clustering algorithm 
http://pralab.diee.unica.it 
18 
Secure clustering algorithms 
Attacks against clustering
http://pralab.diee.unica.it 
? 
19 
Thanks 
for 
your 
a#en-on! 
Any 
quesCons

More Related Content

What's hot

Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub...
Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub...Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub...
Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub...
Pluribus One
 
Sparse Support Faces - Battista Biggio - Int'l Conf. Biometrics, ICB 2015, Ph...
Sparse Support Faces - Battista Biggio - Int'l Conf. Biometrics, ICB 2015, Ph...Sparse Support Faces - Battista Biggio - Int'l Conf. Biometrics, ICB 2015, Ph...
Sparse Support Faces - Battista Biggio - Int'l Conf. Biometrics, ICB 2015, Ph...
Pluribus One
 
Adversarial Learning_Rupam Bhattacharya
Adversarial Learning_Rupam BhattacharyaAdversarial Learning_Rupam Bhattacharya
Adversarial Learning_Rupam Bhattacharya
Rupam Bhattacharya
 
Machine Learning under Attack: Vulnerability Exploitation and Security Measures
Machine Learning under Attack: Vulnerability Exploitation and Security MeasuresMachine Learning under Attack: Vulnerability Exploitation and Security Measures
Machine Learning under Attack: Vulnerability Exploitation and Security Measures
Pluribus One
 
Research of adversarial example on a deep neural network
Research of adversarial example on a deep neural networkResearch of adversarial example on a deep neural network
Research of adversarial example on a deep neural network
NAVER Engineering
 
Universal Adversarial Perturbation
Universal Adversarial PerturbationUniversal Adversarial Perturbation
Universal Adversarial Perturbation
Hyunwoo Kim
 
Automated In-memory Malware/Rootkit Detection via Binary Analysis and Machin...
Automated In-memory Malware/Rootkit  Detection via Binary Analysis and Machin...Automated In-memory Malware/Rootkit  Detection via Binary Analysis and Machin...
Automated In-memory Malware/Rootkit Detection via Binary Analysis and Machin...
Malachi Jones
 
Self-learning systems for cyber security
Self-learning systems for cyber securitySelf-learning systems for cyber security
Self-learning systems for cyber security
Kim Hammar
 
IRJET- Machine Learning and Deep Learning Methods for Cybersecurity
IRJET- Machine Learning and Deep Learning Methods for CybersecurityIRJET- Machine Learning and Deep Learning Methods for Cybersecurity
IRJET- Machine Learning and Deep Learning Methods for Cybersecurity
IRJET Journal
 
VB2015 Malware Classification meets crowd-sourcing
VB2015 Malware Classification meets crowd-sourcingVB2015 Malware Classification meets crowd-sourcing
VB2015 Malware Classification meets crowd-sourcing
John D. Park
 
Strata San Jose 2016 - Reduce False Positives in Security
Strata San Jose 2016 - Reduce False Positives in Security Strata San Jose 2016 - Reduce False Positives in Security
Strata San Jose 2016 - Reduce False Positives in Security
Ram Shankar Siva Kumar
 
Applicability issues of Evasion-Based Adversarial Attacks and Mitigation Tech...
Applicability issues of Evasion-Based Adversarial Attacks and Mitigation Tech...Applicability issues of Evasion-Based Adversarial Attacks and Mitigation Tech...
Applicability issues of Evasion-Based Adversarial Attacks and Mitigation Tech...
Kishor Datta Gupta
 
The evaluation for the defense of adversarial attacks
The evaluation for the defense of adversarial attacksThe evaluation for the defense of adversarial attacks
The evaluation for the defense of adversarial attacks
Simossyi Funabashi
 
Anomaly detection (Unsupervised Learning) in Machine Learning
Anomaly detection (Unsupervised Learning) in Machine LearningAnomaly detection (Unsupervised Learning) in Machine Learning
Anomaly detection (Unsupervised Learning) in Machine Learning
Kuppusamy P
 
Application of machine learning and cognitive computing in intrusion detectio...
Application of machine learning and cognitive computing in intrusion detectio...Application of machine learning and cognitive computing in intrusion detectio...
Application of machine learning and cognitive computing in intrusion detectio...
Mahdi Hosseini Moghaddam
 

What's hot (15)

Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub...
Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub...Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub...
Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub...
 
Sparse Support Faces - Battista Biggio - Int'l Conf. Biometrics, ICB 2015, Ph...
Sparse Support Faces - Battista Biggio - Int'l Conf. Biometrics, ICB 2015, Ph...Sparse Support Faces - Battista Biggio - Int'l Conf. Biometrics, ICB 2015, Ph...
Sparse Support Faces - Battista Biggio - Int'l Conf. Biometrics, ICB 2015, Ph...
 
Adversarial Learning_Rupam Bhattacharya
Adversarial Learning_Rupam BhattacharyaAdversarial Learning_Rupam Bhattacharya
Adversarial Learning_Rupam Bhattacharya
 
Machine Learning under Attack: Vulnerability Exploitation and Security Measures
Machine Learning under Attack: Vulnerability Exploitation and Security MeasuresMachine Learning under Attack: Vulnerability Exploitation and Security Measures
Machine Learning under Attack: Vulnerability Exploitation and Security Measures
 
Research of adversarial example on a deep neural network
Research of adversarial example on a deep neural networkResearch of adversarial example on a deep neural network
Research of adversarial example on a deep neural network
 
Universal Adversarial Perturbation
Universal Adversarial PerturbationUniversal Adversarial Perturbation
Universal Adversarial Perturbation
 
Automated In-memory Malware/Rootkit Detection via Binary Analysis and Machin...
Automated In-memory Malware/Rootkit  Detection via Binary Analysis and Machin...Automated In-memory Malware/Rootkit  Detection via Binary Analysis and Machin...
Automated In-memory Malware/Rootkit Detection via Binary Analysis and Machin...
 
Self-learning systems for cyber security
Self-learning systems for cyber securitySelf-learning systems for cyber security
Self-learning systems for cyber security
 
IRJET- Machine Learning and Deep Learning Methods for Cybersecurity
IRJET- Machine Learning and Deep Learning Methods for CybersecurityIRJET- Machine Learning and Deep Learning Methods for Cybersecurity
IRJET- Machine Learning and Deep Learning Methods for Cybersecurity
 
VB2015 Malware Classification meets crowd-sourcing
VB2015 Malware Classification meets crowd-sourcingVB2015 Malware Classification meets crowd-sourcing
VB2015 Malware Classification meets crowd-sourcing
 
Strata San Jose 2016 - Reduce False Positives in Security
Strata San Jose 2016 - Reduce False Positives in Security Strata San Jose 2016 - Reduce False Positives in Security
Strata San Jose 2016 - Reduce False Positives in Security
 
Applicability issues of Evasion-Based Adversarial Attacks and Mitigation Tech...
Applicability issues of Evasion-Based Adversarial Attacks and Mitigation Tech...Applicability issues of Evasion-Based Adversarial Attacks and Mitigation Tech...
Applicability issues of Evasion-Based Adversarial Attacks and Mitigation Tech...
 
The evaluation for the defense of adversarial attacks
The evaluation for the defense of adversarial attacksThe evaluation for the defense of adversarial attacks
The evaluation for the defense of adversarial attacks
 
Anomaly detection (Unsupervised Learning) in Machine Learning
Anomaly detection (Unsupervised Learning) in Machine LearningAnomaly detection (Unsupervised Learning) in Machine Learning
Anomaly detection (Unsupervised Learning) in Machine Learning
 
Application of machine learning and cognitive computing in intrusion detectio...
Application of machine learning and cognitive computing in intrusion detectio...Application of machine learning and cognitive computing in intrusion detectio...
Application of machine learning and cognitive computing in intrusion detectio...
 

Viewers also liked

Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"
Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"
Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"
Pluribus One
 
Support Vector Machines Under Adversarial Label Noise (ACML 2011) - Battista ...
Support Vector Machines Under Adversarial Label Noise (ACML 2011) - Battista ...Support Vector Machines Under Adversarial Label Noise (ACML 2011) - Battista ...
Support Vector Machines Under Adversarial Label Noise (ACML 2011) - Battista ...
Pluribus One
 
Making neural programming architectures generalize via recursion
Making neural programming architectures generalize via recursionMaking neural programming architectures generalize via recursion
Making neural programming architectures generalize via recursion
Katy Lee
 
What Makes Great Infographics
What Makes Great InfographicsWhat Makes Great Infographics
What Makes Great Infographics
SlideShare
 
Masters of SlideShare
Masters of SlideShareMasters of SlideShare
Masters of SlideShare
Kapost
 
STOP! VIEW THIS! 10-Step Checklist When Uploading to Slideshare
STOP! VIEW THIS! 10-Step Checklist When Uploading to SlideshareSTOP! VIEW THIS! 10-Step Checklist When Uploading to Slideshare
STOP! VIEW THIS! 10-Step Checklist When Uploading to Slideshare
Empowered Presentations
 
You Suck At PowerPoint!
You Suck At PowerPoint!You Suck At PowerPoint!
You Suck At PowerPoint!
Jesse Desjardins - @jessedee
 
10 Ways to Win at SlideShare SEO & Presentation Optimization
10 Ways to Win at SlideShare SEO & Presentation Optimization10 Ways to Win at SlideShare SEO & Presentation Optimization
10 Ways to Win at SlideShare SEO & Presentation Optimization
Oneupweb
 
How To Get More From SlideShare - Super-Simple Tips For Content Marketing
How To Get More From SlideShare - Super-Simple Tips For Content MarketingHow To Get More From SlideShare - Super-Simple Tips For Content Marketing
How To Get More From SlideShare - Super-Simple Tips For Content Marketing
Content Marketing Institute
 
How to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & TricksHow to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & Tricks
SlideShare
 

Viewers also liked (10)

Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"
Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"
Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"
 
Support Vector Machines Under Adversarial Label Noise (ACML 2011) - Battista ...
Support Vector Machines Under Adversarial Label Noise (ACML 2011) - Battista ...Support Vector Machines Under Adversarial Label Noise (ACML 2011) - Battista ...
Support Vector Machines Under Adversarial Label Noise (ACML 2011) - Battista ...
 
Making neural programming architectures generalize via recursion
Making neural programming architectures generalize via recursionMaking neural programming architectures generalize via recursion
Making neural programming architectures generalize via recursion
 
What Makes Great Infographics
What Makes Great InfographicsWhat Makes Great Infographics
What Makes Great Infographics
 
Masters of SlideShare
Masters of SlideShareMasters of SlideShare
Masters of SlideShare
 
STOP! VIEW THIS! 10-Step Checklist When Uploading to Slideshare
STOP! VIEW THIS! 10-Step Checklist When Uploading to SlideshareSTOP! VIEW THIS! 10-Step Checklist When Uploading to Slideshare
STOP! VIEW THIS! 10-Step Checklist When Uploading to Slideshare
 
You Suck At PowerPoint!
You Suck At PowerPoint!You Suck At PowerPoint!
You Suck At PowerPoint!
 
10 Ways to Win at SlideShare SEO & Presentation Optimization
10 Ways to Win at SlideShare SEO & Presentation Optimization10 Ways to Win at SlideShare SEO & Presentation Optimization
10 Ways to Win at SlideShare SEO & Presentation Optimization
 
How To Get More From SlideShare - Super-Simple Tips For Content Marketing
How To Get More From SlideShare - Super-Simple Tips For Content MarketingHow To Get More From SlideShare - Super-Simple Tips For Content Marketing
How To Get More From SlideShare - Super-Simple Tips For Content Marketing
 
How to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & TricksHow to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & Tricks
 

Similar to Battista Biggio @ AISec 2014 - Poisoning Behavioral Malware Clustering

Survey of Adversarial Attacks in Deep Learning Models
Survey of Adversarial Attacks in Deep Learning ModelsSurvey of Adversarial Attacks in Deep Learning Models
Survey of Adversarial Attacks in Deep Learning Models
IRJET Journal
 
6212020 Originality Reporthttpsucumberlands.blackboar.docx
6212020 Originality Reporthttpsucumberlands.blackboar.docx6212020 Originality Reporthttpsucumberlands.blackboar.docx
6212020 Originality Reporthttpsucumberlands.blackboar.docx
BHANU281672
 
Among Viruses, Trojans, and Backdoors:Fighting Malware in 2022
Among Viruses, Trojans, and Backdoors:Fighting Malware in 2022Among Viruses, Trojans, and Backdoors:Fighting Malware in 2022
Among Viruses, Trojans, and Backdoors:Fighting Malware in 2022
Marcus Botacin
 
Statistical performance assessment of supervised machine learning algorithms ...
Statistical performance assessment of supervised machine learning algorithms ...Statistical performance assessment of supervised machine learning algorithms ...
Statistical performance assessment of supervised machine learning algorithms ...
IAESIJAI
 
Changes and Bugs: Mining and Predicting Development Activities
Changes and Bugs: Mining and Predicting Development ActivitiesChanges and Bugs: Mining and Predicting Development Activities
Changes and Bugs: Mining and Predicting Development Activities
Thomas Zimmermann
 
Application Threat Modeling In Risk Management
Application Threat Modeling In Risk ManagementApplication Threat Modeling In Risk Management
Application Threat Modeling In Risk Management
Mel Drews
 
slides_security_and_privacy_in_machine_learning.pptx
slides_security_and_privacy_in_machine_learning.pptxslides_security_and_privacy_in_machine_learning.pptx
slides_security_and_privacy_in_machine_learning.pptx
ssuserabf73f
 
A Survey of Security of Multimodal Biometric Systems
A Survey of Security of Multimodal Biometric SystemsA Survey of Security of Multimodal Biometric Systems
A Survey of Security of Multimodal Biometric Systems
IJERA Editor
 
ICoSTEC-PPT.pptx
ICoSTEC-PPT.pptxICoSTEC-PPT.pptx
ICoSTEC-PPT.pptx
RickiFirmansyah1
 
SafeAssign Originality ReportSummer 2019 - Security Architecture.docx
SafeAssign Originality ReportSummer 2019 - Security Architecture.docxSafeAssign Originality ReportSummer 2019 - Security Architecture.docx
SafeAssign Originality ReportSummer 2019 - Security Architecture.docx
jeffsrosalyn
 
“AI techniques in cyber-security applications”. Flammini lnu susec19
“AI techniques in cyber-security applications”. Flammini lnu susec19“AI techniques in cyber-security applications”. Flammini lnu susec19
“AI techniques in cyber-security applications”. Flammini lnu susec19
Francesco Flammini
 
Group 10 - DNN Presentation for UOM.pptx
Group 10 - DNN Presentation for UOM.pptxGroup 10 - DNN Presentation for UOM.pptx
Group 10 - DNN Presentation for UOM.pptx
DanNiles4
 
20170412 om patri pres 153pdf
20170412 om patri pres 153pdf20170412 om patri pres 153pdf
TOWARDS DETECTION CYBER ATTACKS PPT 1.pptx
TOWARDS DETECTION CYBER ATTACKS PPT 1.pptxTOWARDS DETECTION CYBER ATTACKS PPT 1.pptx
TOWARDS DETECTION CYBER ATTACKS PPT 1.pptx
Nagarajusabhavath
 
Msc dare journal 1
Msc dare journal 1Msc dare journal 1
Msc dare journal 1
OluwadareOlatunji1
 
MALWARE DETECTION AND SUPPRESSION USING BLOCKCHAIN TECHNOLOGY
MALWARE DETECTION AND SUPPRESSION USING BLOCKCHAIN TECHNOLOGYMALWARE DETECTION AND SUPPRESSION USING BLOCKCHAIN TECHNOLOGY
MALWARE DETECTION AND SUPPRESSION USING BLOCKCHAIN TECHNOLOGY
IRJET Journal
 
H1803025360
H1803025360H1803025360
H1803025360
IOSR Journals
 
mcq edu03 Anju 23.pdf
mcq edu03 Anju 23.pdfmcq edu03 Anju 23.pdf
mcq edu03 Anju 23.pdf
ANJUMOHANANU
 
Behind the Mask: Understanding the Structural Forces That Make Social Graphs ...
Behind the Mask: Understanding the Structural Forces That Make Social Graphs ...Behind the Mask: Understanding the Structural Forces That Make Social Graphs ...
Behind the Mask: Understanding the Structural Forces That Make Social Graphs ...
Sameera Horawalavithana
 
J017446568
J017446568J017446568
J017446568
IOSR Journals
 

Similar to Battista Biggio @ AISec 2014 - Poisoning Behavioral Malware Clustering (20)

Survey of Adversarial Attacks in Deep Learning Models
Survey of Adversarial Attacks in Deep Learning ModelsSurvey of Adversarial Attacks in Deep Learning Models
Survey of Adversarial Attacks in Deep Learning Models
 
6212020 Originality Reporthttpsucumberlands.blackboar.docx
6212020 Originality Reporthttpsucumberlands.blackboar.docx6212020 Originality Reporthttpsucumberlands.blackboar.docx
6212020 Originality Reporthttpsucumberlands.blackboar.docx
 
Among Viruses, Trojans, and Backdoors:Fighting Malware in 2022
Among Viruses, Trojans, and Backdoors:Fighting Malware in 2022Among Viruses, Trojans, and Backdoors:Fighting Malware in 2022
Among Viruses, Trojans, and Backdoors:Fighting Malware in 2022
 
Statistical performance assessment of supervised machine learning algorithms ...
Statistical performance assessment of supervised machine learning algorithms ...Statistical performance assessment of supervised machine learning algorithms ...
Statistical performance assessment of supervised machine learning algorithms ...
 
Changes and Bugs: Mining and Predicting Development Activities
Changes and Bugs: Mining and Predicting Development ActivitiesChanges and Bugs: Mining and Predicting Development Activities
Changes and Bugs: Mining and Predicting Development Activities
 
Application Threat Modeling In Risk Management
Application Threat Modeling In Risk ManagementApplication Threat Modeling In Risk Management
Application Threat Modeling In Risk Management
 
slides_security_and_privacy_in_machine_learning.pptx
slides_security_and_privacy_in_machine_learning.pptxslides_security_and_privacy_in_machine_learning.pptx
slides_security_and_privacy_in_machine_learning.pptx
 
A Survey of Security of Multimodal Biometric Systems
A Survey of Security of Multimodal Biometric SystemsA Survey of Security of Multimodal Biometric Systems
A Survey of Security of Multimodal Biometric Systems
 
ICoSTEC-PPT.pptx
ICoSTEC-PPT.pptxICoSTEC-PPT.pptx
ICoSTEC-PPT.pptx
 
SafeAssign Originality ReportSummer 2019 - Security Architecture.docx
SafeAssign Originality ReportSummer 2019 - Security Architecture.docxSafeAssign Originality ReportSummer 2019 - Security Architecture.docx
SafeAssign Originality ReportSummer 2019 - Security Architecture.docx
 
“AI techniques in cyber-security applications”. Flammini lnu susec19
“AI techniques in cyber-security applications”. Flammini lnu susec19“AI techniques in cyber-security applications”. Flammini lnu susec19
“AI techniques in cyber-security applications”. Flammini lnu susec19
 
Group 10 - DNN Presentation for UOM.pptx
Group 10 - DNN Presentation for UOM.pptxGroup 10 - DNN Presentation for UOM.pptx
Group 10 - DNN Presentation for UOM.pptx
 
20170412 om patri pres 153pdf
20170412 om patri pres 153pdf20170412 om patri pres 153pdf
20170412 om patri pres 153pdf
 
TOWARDS DETECTION CYBER ATTACKS PPT 1.pptx
TOWARDS DETECTION CYBER ATTACKS PPT 1.pptxTOWARDS DETECTION CYBER ATTACKS PPT 1.pptx
TOWARDS DETECTION CYBER ATTACKS PPT 1.pptx
 
Msc dare journal 1
Msc dare journal 1Msc dare journal 1
Msc dare journal 1
 
MALWARE DETECTION AND SUPPRESSION USING BLOCKCHAIN TECHNOLOGY
MALWARE DETECTION AND SUPPRESSION USING BLOCKCHAIN TECHNOLOGYMALWARE DETECTION AND SUPPRESSION USING BLOCKCHAIN TECHNOLOGY
MALWARE DETECTION AND SUPPRESSION USING BLOCKCHAIN TECHNOLOGY
 
H1803025360
H1803025360H1803025360
H1803025360
 
mcq edu03 Anju 23.pdf
mcq edu03 Anju 23.pdfmcq edu03 Anju 23.pdf
mcq edu03 Anju 23.pdf
 
Behind the Mask: Understanding the Structural Forces That Make Social Graphs ...
Behind the Mask: Understanding the Structural Forces That Make Social Graphs ...Behind the Mask: Understanding the Structural Forces That Make Social Graphs ...
Behind the Mask: Understanding the Structural Forces That Make Social Graphs ...
 
J017446568
J017446568J017446568
J017446568
 

More from Pluribus One

Smart Textiles - Prospettive di mercato - Davide Ariu
Smart Textiles - Prospettive di mercato - Davide Ariu Smart Textiles - Prospettive di mercato - Davide Ariu
Smart Textiles - Prospettive di mercato - Davide Ariu
Pluribus One
 
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning - 2019 Int...
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning - 2019 Int...Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning - 2019 Int...
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning - 2019 Int...
Pluribus One
 
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning. ICMLC 201...
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning. ICMLC 201...Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning. ICMLC 201...
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning. ICMLC 201...
Pluribus One
 
Wild patterns - Ten years after the rise of Adversarial Machine Learning - Ne...
Wild patterns - Ten years after the rise of Adversarial Machine Learning - Ne...Wild patterns - Ten years after the rise of Adversarial Machine Learning - Ne...
Wild patterns - Ten years after the rise of Adversarial Machine Learning - Ne...
Pluribus One
 
WILD PATTERNS - Introduction to Adversarial Machine Learning - ITASEC 2019
WILD PATTERNS - Introduction to Adversarial Machine Learning - ITASEC 2019WILD PATTERNS - Introduction to Adversarial Machine Learning - ITASEC 2019
WILD PATTERNS - Introduction to Adversarial Machine Learning - ITASEC 2019
Pluribus One
 
Zahid Akhtar - Ph.D. Defense Slides
Zahid Akhtar - Ph.D. Defense SlidesZahid Akhtar - Ph.D. Defense Slides
Zahid Akhtar - Ph.D. Defense Slides
Pluribus One
 
Design of robust classifiers for adversarial environments - Systems, Man, and...
Design of robust classifiers for adversarial environments - Systems, Man, and...Design of robust classifiers for adversarial environments - Systems, Man, and...
Design of robust classifiers for adversarial environments - Systems, Man, and...
Pluribus One
 
Robustness of multimodal biometric verification systems under realistic spoof...
Robustness of multimodal biometric verification systems under realistic spoof...Robustness of multimodal biometric verification systems under realistic spoof...
Robustness of multimodal biometric verification systems under realistic spoof...
Pluribus One
 
Understanding the risk factors of learning in adversarial environments
Understanding the risk factors of learning in adversarial environmentsUnderstanding the risk factors of learning in adversarial environments
Understanding the risk factors of learning in adversarial environments
Pluribus One
 
Amilab IJCB 2011 Poster
Amilab IJCB 2011 PosterAmilab IJCB 2011 Poster
Amilab IJCB 2011 Poster
Pluribus One
 
Ariu - Workshop on Artificial Intelligence and Security - 2011
Ariu - Workshop on Artificial Intelligence and Security - 2011Ariu - Workshop on Artificial Intelligence and Security - 2011
Ariu - Workshop on Artificial Intelligence and Security - 2011
Pluribus One
 
Ariu - Workshop on Applications of Pattern Analysis 2010 - Poster
Ariu - Workshop on Applications of Pattern Analysis 2010 - PosterAriu - Workshop on Applications of Pattern Analysis 2010 - Poster
Ariu - Workshop on Applications of Pattern Analysis 2010 - Poster
Pluribus One
 
Ariu - Workshop on Multiple Classifier Systems - 2011
Ariu - Workshop on Multiple Classifier Systems - 2011Ariu - Workshop on Multiple Classifier Systems - 2011
Ariu - Workshop on Multiple Classifier Systems - 2011
Pluribus One
 
Ariu - Workshop on Applications of Pattern Analysis
Ariu - Workshop on Applications of Pattern AnalysisAriu - Workshop on Applications of Pattern Analysis
Ariu - Workshop on Applications of Pattern Analysis
Pluribus One
 
Ariu - Workshop on Multiple Classifier Systems 2011
Ariu - Workshop on Multiple Classifier Systems 2011Ariu - Workshop on Multiple Classifier Systems 2011
Ariu - Workshop on Multiple Classifier Systems 2011
Pluribus One
 
Robustness of Multimodal Biometric Systems under Realistic Spoof Attacks agai...
Robustness of Multimodal Biometric Systems under Realistic Spoof Attacks agai...Robustness of Multimodal Biometric Systems under Realistic Spoof Attacks agai...
Robustness of Multimodal Biometric Systems under Realistic Spoof Attacks agai...
Pluribus One
 
Wiamis2010 poster
Wiamis2010 posterWiamis2010 poster
Wiamis2010 poster
Pluribus One
 

More from Pluribus One (17)

Smart Textiles - Prospettive di mercato - Davide Ariu
Smart Textiles - Prospettive di mercato - Davide Ariu Smart Textiles - Prospettive di mercato - Davide Ariu
Smart Textiles - Prospettive di mercato - Davide Ariu
 
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning - 2019 Int...
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning - 2019 Int...Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning - 2019 Int...
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning - 2019 Int...
 
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning. ICMLC 201...
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning. ICMLC 201...Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning. ICMLC 201...
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning. ICMLC 201...
 
Wild patterns - Ten years after the rise of Adversarial Machine Learning - Ne...
Wild patterns - Ten years after the rise of Adversarial Machine Learning - Ne...Wild patterns - Ten years after the rise of Adversarial Machine Learning - Ne...
Wild patterns - Ten years after the rise of Adversarial Machine Learning - Ne...
 
WILD PATTERNS - Introduction to Adversarial Machine Learning - ITASEC 2019
WILD PATTERNS - Introduction to Adversarial Machine Learning - ITASEC 2019WILD PATTERNS - Introduction to Adversarial Machine Learning - ITASEC 2019
WILD PATTERNS - Introduction to Adversarial Machine Learning - ITASEC 2019
 
Zahid Akhtar - Ph.D. Defense Slides
Zahid Akhtar - Ph.D. Defense SlidesZahid Akhtar - Ph.D. Defense Slides
Zahid Akhtar - Ph.D. Defense Slides
 
Design of robust classifiers for adversarial environments - Systems, Man, and...
Design of robust classifiers for adversarial environments - Systems, Man, and...Design of robust classifiers for adversarial environments - Systems, Man, and...
Design of robust classifiers for adversarial environments - Systems, Man, and...
 
Robustness of multimodal biometric verification systems under realistic spoof...
Robustness of multimodal biometric verification systems under realistic spoof...Robustness of multimodal biometric verification systems under realistic spoof...
Robustness of multimodal biometric verification systems under realistic spoof...
 
Understanding the risk factors of learning in adversarial environments
Understanding the risk factors of learning in adversarial environmentsUnderstanding the risk factors of learning in adversarial environments
Understanding the risk factors of learning in adversarial environments
 
Amilab IJCB 2011 Poster
Amilab IJCB 2011 PosterAmilab IJCB 2011 Poster
Amilab IJCB 2011 Poster
 
Ariu - Workshop on Artificial Intelligence and Security - 2011
Ariu - Workshop on Artificial Intelligence and Security - 2011Ariu - Workshop on Artificial Intelligence and Security - 2011
Ariu - Workshop on Artificial Intelligence and Security - 2011
 
Ariu - Workshop on Applications of Pattern Analysis 2010 - Poster
Ariu - Workshop on Applications of Pattern Analysis 2010 - PosterAriu - Workshop on Applications of Pattern Analysis 2010 - Poster
Ariu - Workshop on Applications of Pattern Analysis 2010 - Poster
 
Ariu - Workshop on Multiple Classifier Systems - 2011
Ariu - Workshop on Multiple Classifier Systems - 2011Ariu - Workshop on Multiple Classifier Systems - 2011
Ariu - Workshop on Multiple Classifier Systems - 2011
 
Ariu - Workshop on Applications of Pattern Analysis
Ariu - Workshop on Applications of Pattern AnalysisAriu - Workshop on Applications of Pattern Analysis
Ariu - Workshop on Applications of Pattern Analysis
 
Ariu - Workshop on Multiple Classifier Systems 2011
Ariu - Workshop on Multiple Classifier Systems 2011Ariu - Workshop on Multiple Classifier Systems 2011
Ariu - Workshop on Multiple Classifier Systems 2011
 
Robustness of Multimodal Biometric Systems under Realistic Spoof Attacks agai...
Robustness of Multimodal Biometric Systems under Realistic Spoof Attacks agai...Robustness of Multimodal Biometric Systems under Realistic Spoof Attacks agai...
Robustness of Multimodal Biometric Systems under Realistic Spoof Attacks agai...
 
Wiamis2010 poster
Wiamis2010 posterWiamis2010 poster
Wiamis2010 poster
 

Recently uploaded

Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
RitikBhardwaj56
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
taiba qazi
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
Bisnar Chase Personal Injury Attorneys
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 

Recently uploaded (20)

Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 

Battista Biggio @ AISec 2014 - Poisoning Behavioral Malware Clustering

  • 1. Pa#ern Recogni-on and Applica-ons Lab Poisoning Behavioral Malware Clustering University of Cagliari, Italy Department of Electrical and Electronic Engineering Ba#sta Biggio1, Konrad Rieck2, Davide Ariu1, Chris-an Wressnegger2, Igino Corona1, Giorgio Giacinto1, and Fabio Roli1 (1) University of Cagliari (IT) (2) University of GoeLngen (GE) Sco#sdale, Arizona, AISec 2014 US, Nov., 7 2014
  • 2. Threats and Attacks in Computer Security • Huge number of devices, services and apps on the Internet – Vulnerabilities in code, services, apps, etc. • Attacks through malicious software (malware) – Botnets, spam, identity theft / stolen credit card numbers • Manual analysis and crafting of signatures costly – Need for automated / assisted detection (and rule generation) – Machine learning-based defenses (data clustering) http://pralab.diee.unica.it 2 Evasion: malware families / variants +65% new malware variants from 2012 to 2013 Mobile Adware & Malw. Analysis, Symantec, 2014 Detection: antivirus systems Rule-based systems
  • 3. Data Clustering for Computer Security • Goal: clustering of malware families to identify common characteristics and design suitable countermeasures • e.g., antivirus rules / signatures http://pralab.diee.unica.it 3 xx x x x x x x x x x x x x x x x x1 x2 ... xd feature extraction (e.g., executed instructions, system calls, etc.) clustering of malware families (e.g., similar program behavior) for each cluster if … then … else … data analysis / countermeasure design (e.g., signature generation) data collection (honeypots) Malware samples
  • 4. Is Data Clustering Secure? • Attackers can poison input data to subvert malware clustering http://pralab.diee.unica.it 4 x x x x x x x x x x x x x x x x x x1 x2 ... xd feature extraction (e.g., executed instructions, system calls, etc.) Malware samples designed to subvert clustering … is significantly compromised for each cluster if … then … else … … becomes useless (too many false alarms, low detection rate) (1) B. Biggio et al. Is data clustering in adversarial settings secure? In AISec 2013 (2) B. Biggio et al.. Poisoning complete-linkage hierarchical clustering, In S+SSPR 2014 data collection (honeypots) clustering of malware families (e.g., similar program behavior) data analysis / countermeasure design (e.g., signature generation)
  • 5. Is Data Clustering Secure? • Our previous work (1,2): – Framework for security evaluation of clustering algorithms – Formalization of poisoning attacks (optimization) against single- and complete-linkage hierarchical clustering • In this work we focus on a realistic application example on http://pralab.diee.unica.it 5 Poisoning a,acks against a behavioral malware clustering approach (3) Malheur h,p://www.mlsec.org/malheur/ (1) B. Biggio et al.. Is data clustering in adversarial settings secure? In AISec 2013 (2) B. Biggio et al.. Poisoning complete-linkage hierarchical clustering. In S+SSPR 2014 (3) K. Rieck et al.. Automatic analysis of malware behavior using machine learning. JCS 2011
  • 6. Poisoning Attacks • Goal: to maximally compromise the clustering output on D • Capability: adding m attack samples • Knowledge: perfect / worst-case attack • Attack strategy: x http://pralab.diee.unica.it 6 max A m dc (Y,Y!(A)), A= ai { }i=1 Distance between the clustering in the absence of attack and that under attack Y! = fD(D∪A) x x x x x x x x x x x x x x x Attack samples A Y = f (D) x x x x x x x x x x x x Clustering on untainted data D (1) B. Biggio et al. Is data clustering in adversarial settings secure? In AISec 2013 (2) B. Biggio et al.. Poisoning complete-linkage hierarchical clustering, In S+SSPR 2014
  • 7. Poisoning Attacks dc (Y,Y!) = YY T −Y!Y!T http://pralab.diee.unica.it 7 F m , Y = %%%%%% & 1 0 0 0 0 1 0 0 1 1 0 0 0 1 0 # $ (((((( , YY T = ' 1 0 0 1 0 0 1 1 0 0 0 1 1 0 0 1 0 0 1 0 0 0 0 0 1 # %%%%%% $ This distance counts how many pairs of samples have been clustered together in one clustering and not in the other, and vice-versa & (((((( ' For a given clustering: Sample 1 … Sample 5 max A dc (Y,Y!(A)), A= ai { }i=1 (1) B. Biggio et al. Is data clustering in adversarial settings secure? In AISec 2013 (2) B. Biggio et al.. Poisoning complete-linkage hierarchical clustering, In S+SSPR 2014
  • 8. Single-Linkage Hierarchical Clustering • Bottom-up agglomerative clustering – each point is initially considered as a cluster – closest clusters are iteratively merged • Linkage criterion to define distance between clusters – single-linkage criterion x x • Clustering output is a hierarchy of clusterings – Criterion needed to select a given clustering (e.g., number of clusters) – Cutoff threshold on the maximum intra-cluster distance http://pralab.diee.unica.it 8 x dist(Ci,Cj ) = min a∈Ci , b∈Cj d(a, b) x x x x x (1) B. Biggio et al. Is data clustering in adversarial settings secure? In AISec 2013 (2) B. Biggio et al.. Poisoning complete-linkage hierarchical clustering, In S+SSPR 2014
  • 9. Poisoning Single-Linkage Clustering • Attack strategy: • Heuristic-based solutions m – Greedy approach: adding one attack sample at a time – Bridge-based heuristics: local maxima are found in between the closest points of adjacent clusters http://pralab.diee.unica.it 9 max A dc (Y,Y!(A)), A= ai { }i=1 (1) B. Biggio et al. Is data clustering in adversarial settings secure? In AISec 2013 (2) B. Biggio et al.. Poisoning complete-linkage hierarchical clustering, In S+SSPR 2014
  • 10. Poisoning Single-Linkage Clustering http://pralab.diee.unica.it 10 • Underlying idea: bridging the closest clusters – Given K clusters, K-1 candidate attack points Candidate attack points (1) B. Biggio et al. Is data clustering in adversarial settings secure? In AISec 2013 (2) B. Biggio et al.. Poisoning complete-linkage hierarchical clustering, In S+SSPR 2014
  • 11. Poisoning Single-Linkage Clustering 1. Bridge (Best): evaluates Y’(a) for each candidate attack, retaining the best one – Clustering is run for each candidate attack point 2. Bridge (Hard): estimates Y’(a) assuming that each candidate will split the corresponding cluster, potentially merging it with a fragment of the closest cluster – It does not require running clustering to find the best attack point 3. Bridge (Soft): estimates Y’(a) as Bridge (Hard), but using a soft probabilistic estimate instead of 0/1 sample-to-cluster assignments – It does not require running clustering to find the best attack point http://pralab.diee.unica.it 11 (1) B. Biggio et al. Is data clustering in adversarial settings secure? In AISec 2013 (2) B. Biggio et al.. Poisoning complete-linkage hierarchical clustering, In S+SSPR 2014
  • 12. Poisoning Single-Linkage Clustering • The attack compromises the initial clustering by forming heterogeneous clusters http://pralab.diee.unica.it 12 Clustering on untainted data 2.5 Clustering after adding 20 attack samples 2 1.5 1 0.5 0 −0.5 −1 −1.5 −2 −2.5 −2 −1.5 −1 −0.5 0 0.5 1 1.5 (1) B. Biggio et al. Is data clustering in adversarial settings secure? In AISec 2013 (2) B. Biggio et al.. Poisoning complete-linkage hierarchical clustering, In S+SSPR 2014
  • 13. Malheur Behavioral Malware Clustering • Malware executed in a sandbox (e.g., virtual machine) – Monitoring of program behavior (instructions, system calls, etc.) • Embedding of malware behavior in feature space – Each feature denotes presence / absence of a given instruction – Each vector is normalized to unit Euclidean norm • Clustering using single-linkage (or other linkage variants) http://pralab.diee.unica.it 13 Filesystem copy file ‘a’ to ’b’ open file ’foo.txt’ Network ping host ’10.1.2.3’ listen on port ‘31337’ Registry set key ‘reboot’ to ‘1’ (level 1) 14 01 | 11 04 … 02 02 | 02 02 … 0d 01 | 03 0a … 03 03 | 03 01 … 03 0a | 11 04 … Sandbox MIST Instruction (opcode) arguments Feature space 14 01 02 02 + (1) K. Rieck et al.. Automatic analysis of malware behavior using machine learning. JCS 2011
  • 14. Poisoning Malheur • Poisoning single-linkage hierarchical clustering • Problem: how to create bridge points in this feature space? – Binary-valued vectors normalized to unit Euclidean norm • Additional constraint on the manipulation of malware samples – Malware should be modified without affecting malicious functionality – Adding instructions after malware program execution – Feature values can be only incremented http://pralab.diee.unica.it 14 x1 = (1 1 0 0 0) x2 = (0 0 1 1 1) 1.5 1 0.5 0 d(x,x ) 1 d(x,x ) 2 0 1 2 3 number of added features x2 14 01 02 02 + + + Bridge point x1 x x
  • 15. Experimental Setup and Datasets • Setup – Data split into two portions of equal size T and S – T used for extracting instructions and setting the cutoff threshold – S used for performance evaluation – F-measure: agreement between clusters and malware families • Malheur data – 3131 malware samples collected in 2009 (publicly available) – 85 instructions / features (on average) – Cutoff distance (max. F-measure on T): 0.49 (on average) • Recent Malware data – 657 malware samples from most prominent families in 2013 – 78 instructions / features (on average) – Cutoff distance (max. F-measure on T): 0.63 (on average) http://pralab.diee.unica.it 15
  • 16. Experimental Results (Malheur data) • Attack strategies – Bridge (Best/Hard/Soft), Random, Random (Best), F-measure (Best) • Results for Malheur data – Random-based attacks are not effective (high-dimensional space) – Bridging is effective / clusters are fused together (cutoff threshold is fixed) – F-measure decreases while maximizing distance between clusterings Random Random (Best) Bridge (Best) Bridge (Soft) Bridge (Hard) F−measure (Best) 1600 1400 1200 1000 800 600 400 200 0 http://pralab.diee.unica.it 16 100 10 20 30 40 50 60 70 80 0% 2% 5% 7% 9% 11%13%15%17%18%20% Objective function 90 80 70 60 50 40 30 20 10 0% 2% 5% 7% 9% 11% 13% 15% 17% 18% 20% F−measure Fraction of poisoning attacks
  • 17. Experimental Results (Recent Malware data) • Attack strategies – Bridge (Best/Hard/Soft), Random, Random (Best), F-measure (Best) • Results for Recent Malware data – Random-based attacks are not effective (high-dimensional space) – Bridging is effective / clusters are fused together (cutoff threshold is fixed) – F-measure decreases while maximizing distance between clusterings Random Random (Best) Bridge (Best) Bridge (Soft) Bridge (Hard) F−measure (Best) 300 250 200 150 100 50 0 http://pralab.diee.unica.it 17 72 10 20 30 40 50 60 70 80 0% 2% 5% 7% 9% 11%13%15%16%18%20% Objective function 70 68 66 64 62 60 58 56 54 52 0% 2% 5% 7% 9% 11%13%15%16%18%20% F−measure Fraction of poisoning attacks
  • 18. Conclusions and Future Work • Poisoning attacks can subvert behavioral malware clustering • Future work – Extensions to other clustering algorithms, common attack strategy • e.g., black-box optimization with suitable heuristics – Attacks with limited knowledge of the data / clustering algorithm http://pralab.diee.unica.it 18 Secure clustering algorithms Attacks against clustering
  • 19. http://pralab.diee.unica.it ? 19 Thanks for your a#en-on! Any quesCons