SlideShare a Scribd company logo
1 of 30
Download to read offline
2020 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
OF SEARCH LIGHTS AND BLIND SPOTS:
MACHINE LEARNING IN
CYBERSECURITY
SVEN KRASSER, CHIEF SCIENTIST, CROWDSTRIKE
WHO?
§ CrowdStrike
§ Endpoint protection & breach
prevention
§ Endpoint sensor connecting to Cloud
§ Processing 3 trillion events per week
§ My team: Data Science
§ Malware and threat research
§ Sandbox and dynamic analysis
§ Data engineering
§ Machine Learning research
§ Machine Learning software development
§ Hybrid-Analysis.com
2020 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
ML IN
CYBERSECURITY
2020 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
LONG-TIME USE BEHIND THE SCENES
SOMETHING CHANGED ~2013
MECHANICS & ENGINEERS*
* Loosely quoted from an unattributed ML researcher
THE DEMOCRATIZATION OF ML
NEW CHALLENGES
"ML as panacea"
“ML is
inherently safe”
ML monoculture
ML performance
is poorly
understood
QUANTIFYING
THE PROBLEM
PROJECTIONS THROUGH 2022
Source: Gartner (2019)
75%Data governance initiatives not
adequately considering AI security
risks, resulting in financial loss
30%Cyberattacks leveraging data
poisoning, model theft, or
adversarial samples
2020 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
“DO YOU SECURE YOUR ML SYSTEMS TODAY?"
Source: Shankar et al., “Adversarial Machine Learning – Industry Perspectives” (2020)
14%*
“Yes”
2020 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.* ⅓ of organizations polled are in the cybersecurity space
STATIC
ANALYSIS
WHY TALK ABOUT THIS FIELD TODAY?
§ Data is plentiful and unencumbered
§ Challenges translate into other domains
§ Static analysis, while limited, is a cheap workhorse
§ Reducing volume of low-effort attacks
§ Saving compute (and hence dollars) for more complex analysis
§ Pre-execution detection
§ Detection on-the-wire (attachment) and at rest (storage)
2020 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
AV
Update
New
M
alware
1 Day
AV
Update
DetectionRate
2020 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
BASERATE CHALLENGES
125,000
Executables on an average hard
disk
20,000
Process executions per day
2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
100%TPR@1%FPR
2020 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
HOW THE GAME WAS PLAYED
Manual evasions and corresponding countermeasures
2020 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
Hashbusting Polymorphism Packing
Droppers
File
Infectors/Hiding
in Regular Files
Wrapped
Scripts
TRADITIONAL ATTACKER ARSENAL
COUNTERING THE ATTACKER
Heuristics
Static
unpacking
Deep format
inspection
Emulation
① Adversaries
focus on traditional
evasions, which
stick out to ML
② Adversaries
target ML blind
spots
③ Adversaries
leverage ML for
robust evasions
The panacea “track”
0.53 0.28 0.17 0.67 0.56 0.55 0.03 0.04 0.54 0.15
0.56 0.90 0.62 0.97 0.52 0.61 0.82 0.24 0.87 0.36
0.94 0.60 0.53 0.27 0.59 0.63 0.32 0.89 0.91 0.83
0.07 0.57 0.05 0.56 0.95 0.98 0.89 0.24 0.64 0.24
0.45 0.37 0.68 0.25 0.21 0.10 0.52 0.42 0.77 0.11
0.21 0.47 0.05 0.03 0.42 0.96 0.68 0.41 0.96 0.30
0.60 0.50 0.67 0.47 0.80 0.48 0.02 0.53 0.10 0.32
1.00 0.28 0.42 0.31 0.43 0.77 0.11 0.67 0.43 0.31
0.11 0.11 0.70 0.16 0.53 0.58 0.97 0.10 0.83 0.29
0.61 0.31 0.61 0.35 0.03 0.01 0.44 0.77 0.92 0.72
0.26 0.24 0.26 0.03 0.26 0.02 0.35 0.99 0.90 0.03
0.05 0.19 0.27 0.67 0.04 0.48 0.66 0.93 0.04 0.14
0.68 0.69 0.60 0.43 0.12 0.42 0.31 0.74 0.05 0.00
0.98 0.37 0.78 0.46 0.28 0.89 0.01 0.98 0.59 0.75
0.74 0.54 0.63 0.85 0.65 0.22 0.80 0.87 0.82 0.03
0.43 0.91 0.32 0.35 0.21 0.70 0.84 0.36 0.99 0.19
0.92 0.49 0.21 0.50 0.77 0.52 0.60 0.69 0.49 0.38
0.54 0.51 0.07 0.12 0.41 0.40 0.76 0.56 0.20 0.54
0.78 0.61 0.14 0.69 0.39 0.99 0.21 0.90 0.42 0.95
0.09 0.51 0.23 0.22 0.93 0.54 0.00 0.62 0.27 0.98
Problem Space Feature Space
Realizable
Files
WORKING IN FEATURE SPACE
§ Choosing a feature space that always produces realizable files
§ Such as specific binary traits that can be added (but not necessarily removed), e.g. Al-Dujaili
et al. (2018)
§ Imported function names, resources, sections, strings, digital signature, etc.
§ Similar to how an adversary would attack the model
§ Use a substitute model with such a feature space to attack a blackbox model
§ E.g. MalGAN, Hu and Tan (2017)
§ Create (likely) unrealizable feature vectors with some utility
§ Not a realizable attack but allows better preparing for one
§ Increasing robustness at training time
§ Creating pseudo variants for test time (“new family” scenario)
WORKING IN PROBLEM SPACE
A look at both realizable and real-world attacks
2020 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
Ashkenazy and Zini (2019)
“CHAFF” ATTACK
§ Attack on a security vendor production model deployed on endpoints
§ Unconstrained sparse string-based features
§ “This string exists somewhere in the file”
§ Likely heavily weighted
§ Non-monotonic model
§ Extracting strings from files from the product’s whitelist
§ How to toggle the corresponding features?
§ Add the string somewhere
§ Appending to the end of a Portable Executable (the “overlay”) generally keeps the executable
working
§ à All realizable
§ Bypass achieved
2020 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
Winning Offensive Solution – Fleshman (2019)
ML STATIC EVASION COMPETITION
§ Modify malware to bypass 3 non-production research models
§ MalConv (DNN, raw bytes)
§ Non-negative MalConv
§ EMBER (engineered features and LightGBM; Anderson and Roth, 2018)
§ Modified files are verified in a sandbox environment
§ DNN models have only unconstrained features (data anywhere can nudge)
§ EMBER has some unconstrained features
§ Byte entropy histogram (continuous features)
§ Strings
§ Data injected in various areas
§ Overlay
§ New sections
§ Empty space at end of sections (alignment)
§ Bypass achieved
2020 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
Anderson et al. (2018)
LEARNING TO EVADE
§ Reinforcement Learning approach to pick the best sequence of modifications to
achieve evasiveness
§ Action space
§ Modest evasiveness achieved (but no manual intervention as in previous two
approaches)
2020 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
Add import
Change section
names
Create section
Appending data
to sections
New EP that
jumps to
original EP
Removing
signer info
Changing
debug info
Packing Unpacking
Breaking
header
checksum
Add to overlay Etc.
Elkind (2019)
MITIGATING THROUGH REGULARIZATION
§ Premise
§ We know of several perturbation techniques resulting in realizable attacks
§ We want the model to ignore such modifications without constraining the feature space and
reducing expressiveness
§ Pairwise Hidden Regularization
§ Penalize differences in hidden representations ℎ() in DNN between original file 𝑥 and
perturbed file %𝑥
§ min 𝐿𝑜𝑠𝑠 𝜃 + 𝜆 ℎ 𝑥, 𝜃 − ℎ(%𝑥, 𝜃) !
§ Training on perturbed pairs
§ Notionally, perturbed files have a modified overlay (appended data)
§ Other modifications can be implemented accordingly (e.g. adding sections)
§ Models more robust; evasions more expensive
2020 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
CONCLUSIONS
Educating decision
makers about ML
Off-the-shelf
guardrails; best
practices for safety
Cost reduction for
the adversary;
means to increase it
again
Opportunity for
defenders to
achieve higher
levels of robustness
Detectability; avoid
silent failure
sven@crowdstrike.com
@SvenKrasser

More Related Content

What's hot

The Art and Science of Alert Triage
The Art and Science of Alert TriageThe Art and Science of Alert Triage
The Art and Science of Alert TriageSqrrl
 
Au cœur de la roadmap de la Suite Elastic
Au cœur de la roadmap de la Suite ElasticAu cœur de la roadmap de la Suite Elastic
Au cœur de la roadmap de la Suite ElasticElasticsearch
 
Modernizing Your SOC: A CISO-led Training
Modernizing Your SOC: A CISO-led TrainingModernizing Your SOC: A CISO-led Training
Modernizing Your SOC: A CISO-led TrainingSqrrl
 
Threat Hunting Platforms (Collaboration with SANS Institute)
Threat Hunting Platforms (Collaboration with SANS Institute)Threat Hunting Platforms (Collaboration with SANS Institute)
Threat Hunting Platforms (Collaboration with SANS Institute)Sqrrl
 
Art into Science 2017 - Investigation Theory: A Cognitive Approach
Art into Science 2017 - Investigation Theory: A Cognitive ApproachArt into Science 2017 - Investigation Theory: A Cognitive Approach
Art into Science 2017 - Investigation Theory: A Cognitive Approachchrissanders88
 
Identifying Vulnerabilities Using Internet wide Scanning Data
Identifying Vulnerabilities Using Internet wide Scanning DataIdentifying Vulnerabilities Using Internet wide Scanning Data
Identifying Vulnerabilities Using Internet wide Scanning DataJamie O'Hare
 
Abstract Tools for Effective Threat Hunting
Abstract Tools for Effective Threat HuntingAbstract Tools for Effective Threat Hunting
Abstract Tools for Effective Threat Huntingchrissanders88
 
Internet-wide Scanning
Internet-wide ScanningInternet-wide Scanning
Internet-wide ScanningJamie O'Hare
 
Automatiza las detecciones de amenazas y evita falsos positivos
Automatiza las detecciones de amenazas y evita falsos positivosAutomatiza las detecciones de amenazas y evita falsos positivos
Automatiza las detecciones de amenazas y evita falsos positivosImma Valls Bernaus
 
Troubleshooting your elasticsearch cluster like a support engineer
Troubleshooting your elasticsearch cluster like a support engineerTroubleshooting your elasticsearch cluster like a support engineer
Troubleshooting your elasticsearch cluster like a support engineerImma Valls Bernaus
 
Machine Learning for Incident Detection: Getting Started
Machine Learning for Incident Detection: Getting StartedMachine Learning for Incident Detection: Getting Started
Machine Learning for Incident Detection: Getting StartedSqrrl
 
SOC2016 - The Investigation Labyrinth
SOC2016 - The Investigation LabyrinthSOC2016 - The Investigation Labyrinth
SOC2016 - The Investigation Labyrinthchrissanders88
 
CodeOne SF 2018 "Are you deploying and operating with security in mind?"
CodeOne SF 2018 "Are you deploying and operating with security in mind?"CodeOne SF 2018 "Are you deploying and operating with security in mind?"
CodeOne SF 2018 "Are you deploying and operating with security in mind?"Daniel Bryant
 
Will County Sheriff’s Office: Solving Crime with Data
Will County Sheriff’s Office: Solving Crime with DataWill County Sheriff’s Office: Solving Crime with Data
Will County Sheriff’s Office: Solving Crime with DataElasticsearch
 
MITRE ATT&CKcon 2018: Building an Atomic Testing Program, Brian Beyer, Red Ca...
MITRE ATT&CKcon 2018: Building an Atomic Testing Program, Brian Beyer, Red Ca...MITRE ATT&CKcon 2018: Building an Atomic Testing Program, Brian Beyer, Red Ca...
MITRE ATT&CKcon 2018: Building an Atomic Testing Program, Brian Beyer, Red Ca...MITRE - ATT&CKcon
 
O'Reilly Security New York - Predicting Exploitability Final
O'Reilly Security New York - Predicting Exploitability FinalO'Reilly Security New York - Predicting Exploitability Final
O'Reilly Security New York - Predicting Exploitability FinalMichael Roytman
 
Threat Hunting 102: Beyond the Basics
Threat Hunting 102: Beyond the BasicsThreat Hunting 102: Beyond the Basics
Threat Hunting 102: Beyond the BasicsCybereason
 
MITRE ATT&CKcon 2.0: Prioritizing Data Sources for Minimum Viable Detection; ...
MITRE ATT&CKcon 2.0: Prioritizing Data Sources for Minimum Viable Detection; ...MITRE ATT&CKcon 2.0: Prioritizing Data Sources for Minimum Viable Detection; ...
MITRE ATT&CKcon 2.0: Prioritizing Data Sources for Minimum Viable Detection; ...MITRE - ATT&CKcon
 

What's hot (20)

Elastic Stack Roadmap
Elastic Stack RoadmapElastic Stack Roadmap
Elastic Stack Roadmap
 
The Art and Science of Alert Triage
The Art and Science of Alert TriageThe Art and Science of Alert Triage
The Art and Science of Alert Triage
 
Au cœur de la roadmap de la Suite Elastic
Au cœur de la roadmap de la Suite ElasticAu cœur de la roadmap de la Suite Elastic
Au cœur de la roadmap de la Suite Elastic
 
Modernizing Your SOC: A CISO-led Training
Modernizing Your SOC: A CISO-led TrainingModernizing Your SOC: A CISO-led Training
Modernizing Your SOC: A CISO-led Training
 
Threat Hunting Platforms (Collaboration with SANS Institute)
Threat Hunting Platforms (Collaboration with SANS Institute)Threat Hunting Platforms (Collaboration with SANS Institute)
Threat Hunting Platforms (Collaboration with SANS Institute)
 
Art into Science 2017 - Investigation Theory: A Cognitive Approach
Art into Science 2017 - Investigation Theory: A Cognitive ApproachArt into Science 2017 - Investigation Theory: A Cognitive Approach
Art into Science 2017 - Investigation Theory: A Cognitive Approach
 
Identifying Vulnerabilities Using Internet wide Scanning Data
Identifying Vulnerabilities Using Internet wide Scanning DataIdentifying Vulnerabilities Using Internet wide Scanning Data
Identifying Vulnerabilities Using Internet wide Scanning Data
 
Abstract Tools for Effective Threat Hunting
Abstract Tools for Effective Threat HuntingAbstract Tools for Effective Threat Hunting
Abstract Tools for Effective Threat Hunting
 
Internet-wide Scanning
Internet-wide ScanningInternet-wide Scanning
Internet-wide Scanning
 
Automatiza las detecciones de amenazas y evita falsos positivos
Automatiza las detecciones de amenazas y evita falsos positivosAutomatiza las detecciones de amenazas y evita falsos positivos
Automatiza las detecciones de amenazas y evita falsos positivos
 
Troubleshooting your elasticsearch cluster like a support engineer
Troubleshooting your elasticsearch cluster like a support engineerTroubleshooting your elasticsearch cluster like a support engineer
Troubleshooting your elasticsearch cluster like a support engineer
 
Machine Learning for Incident Detection: Getting Started
Machine Learning for Incident Detection: Getting StartedMachine Learning for Incident Detection: Getting Started
Machine Learning for Incident Detection: Getting Started
 
SOC2016 - The Investigation Labyrinth
SOC2016 - The Investigation LabyrinthSOC2016 - The Investigation Labyrinth
SOC2016 - The Investigation Labyrinth
 
SQRRL threat hunting platform
SQRRL threat hunting platformSQRRL threat hunting platform
SQRRL threat hunting platform
 
CodeOne SF 2018 "Are you deploying and operating with security in mind?"
CodeOne SF 2018 "Are you deploying and operating with security in mind?"CodeOne SF 2018 "Are you deploying and operating with security in mind?"
CodeOne SF 2018 "Are you deploying and operating with security in mind?"
 
Will County Sheriff’s Office: Solving Crime with Data
Will County Sheriff’s Office: Solving Crime with DataWill County Sheriff’s Office: Solving Crime with Data
Will County Sheriff’s Office: Solving Crime with Data
 
MITRE ATT&CKcon 2018: Building an Atomic Testing Program, Brian Beyer, Red Ca...
MITRE ATT&CKcon 2018: Building an Atomic Testing Program, Brian Beyer, Red Ca...MITRE ATT&CKcon 2018: Building an Atomic Testing Program, Brian Beyer, Red Ca...
MITRE ATT&CKcon 2018: Building an Atomic Testing Program, Brian Beyer, Red Ca...
 
O'Reilly Security New York - Predicting Exploitability Final
O'Reilly Security New York - Predicting Exploitability FinalO'Reilly Security New York - Predicting Exploitability Final
O'Reilly Security New York - Predicting Exploitability Final
 
Threat Hunting 102: Beyond the Basics
Threat Hunting 102: Beyond the BasicsThreat Hunting 102: Beyond the Basics
Threat Hunting 102: Beyond the Basics
 
MITRE ATT&CKcon 2.0: Prioritizing Data Sources for Minimum Viable Detection; ...
MITRE ATT&CKcon 2.0: Prioritizing Data Sources for Minimum Viable Detection; ...MITRE ATT&CKcon 2.0: Prioritizing Data Sources for Minimum Viable Detection; ...
MITRE ATT&CKcon 2.0: Prioritizing Data Sources for Minimum Viable Detection; ...
 

Similar to Of Search Lights and Blind Spots: Machine Learning in Cybersecurity

2 Roads to Redemption - Thoughts on XSS and SQLIA
2 Roads to Redemption - Thoughts on XSS and SQLIA2 Roads to Redemption - Thoughts on XSS and SQLIA
2 Roads to Redemption - Thoughts on XSS and SQLIAguestfdcb8a
 
AI for security or security for AI - Sergey Gordeychik
AI for security or security for AI - Sergey GordeychikAI for security or security for AI - Sergey Gordeychik
AI for security or security for AI - Sergey GordeychikSergey Gordeychik
 
The Economies of Scaling Software - Josh Long and Abdelmonaim Remani
The Economies of Scaling Software - Josh Long and Abdelmonaim RemaniThe Economies of Scaling Software - Josh Long and Abdelmonaim Remani
The Economies of Scaling Software - Josh Long and Abdelmonaim Remaniploibl
 
The Economies of Scaling Software - Josh Long and Abdelmonaim Remani
The Economies of Scaling Software - Josh Long and Abdelmonaim RemaniThe Economies of Scaling Software - Josh Long and Abdelmonaim Remani
The Economies of Scaling Software - Josh Long and Abdelmonaim RemaniJAXLondon2014
 
Stuxnet redux. malware attribution & lessons learned
Stuxnet redux. malware attribution & lessons learnedStuxnet redux. malware attribution & lessons learned
Stuxnet redux. malware attribution & lessons learnedYury Chemerkin
 
Stop expecting magic fairy dust: Make apps secure by design
Stop expecting magic fairy dust: Make apps secure by designStop expecting magic fairy dust: Make apps secure by design
Stop expecting magic fairy dust: Make apps secure by designPatrick Walsh
 
Virtual Machines Security Internals: Detection and Exploitation
 Virtual Machines Security Internals: Detection and Exploitation Virtual Machines Security Internals: Detection and Exploitation
Virtual Machines Security Internals: Detection and ExploitationMattia Salvi
 
TADSummit, DataArt Keynote: Security in Virtualized Telecom Networks Michael ...
TADSummit, DataArt Keynote: Security in Virtualized Telecom Networks Michael ...TADSummit, DataArt Keynote: Security in Virtualized Telecom Networks Michael ...
TADSummit, DataArt Keynote: Security in Virtualized Telecom Networks Michael ...Alan Quayle
 
Secure Because Math: A Deep-Dive on Machine Learning-Based Monitoring (#Secur...
Secure Because Math: A Deep-Dive on Machine Learning-Based Monitoring (#Secur...Secure Because Math: A Deep-Dive on Machine Learning-Based Monitoring (#Secur...
Secure Because Math: A Deep-Dive on Machine Learning-Based Monitoring (#Secur...Alex Pinto
 
Armo webinar rethinking your cloud security in the shadow of the solar winds ...
Armo webinar rethinking your cloud security in the shadow of the solar winds ...Armo webinar rethinking your cloud security in the shadow of the solar winds ...
Armo webinar rethinking your cloud security in the shadow of the solar winds ...LibbySchulze
 
Chaos engineering & Gameday on AWS
Chaos engineering & Gameday on AWSChaos engineering & Gameday on AWS
Chaos engineering & Gameday on AWSBilal Aybar
 
Security of Web Applications: Top 6 Risks To Avoid
Security of Web Applications: Top 6 Risks To AvoidSecurity of Web Applications: Top 6 Risks To Avoid
Security of Web Applications: Top 6 Risks To Avoidslicklash
 
Digital Security by Design: Security and Legacy at Microsoft - Matthew Parkin...
Digital Security by Design: Security and Legacy at Microsoft - Matthew Parkin...Digital Security by Design: Security and Legacy at Microsoft - Matthew Parkin...
Digital Security by Design: Security and Legacy at Microsoft - Matthew Parkin...KTN
 
Felicitous Computing (invited Talk for UC Irvine ISR Distinguished Speaker Se...
Felicitous Computing (invited Talk for UC Irvine ISR Distinguished Speaker Se...Felicitous Computing (invited Talk for UC Irvine ISR Distinguished Speaker Se...
Felicitous Computing (invited Talk for UC Irvine ISR Distinguished Speaker Se...David Rosenblum
 
Integration&SOA_v0.2
Integration&SOA_v0.2Integration&SOA_v0.2
Integration&SOA_v0.2Sergey Popov
 
Why haven't we stamped out SQL injection and XSS yet
Why haven't we stamped out SQL injection and XSS yetWhy haven't we stamped out SQL injection and XSS yet
Why haven't we stamped out SQL injection and XSS yetRomain Gaucher
 
AI & ML in Cyber Security - Why Algorithms are Dangerous
AI & ML in Cyber Security - Why Algorithms are DangerousAI & ML in Cyber Security - Why Algorithms are Dangerous
AI & ML in Cyber Security - Why Algorithms are DangerousPriyanka Aash
 
AI & ML in Cyber Security - Why Algorithms are Dangerous
AI & ML in Cyber Security - Why Algorithms are DangerousAI & ML in Cyber Security - Why Algorithms are Dangerous
AI & ML in Cyber Security - Why Algorithms are DangerousRaffael Marty
 

Similar to Of Search Lights and Blind Spots: Machine Learning in Cybersecurity (20)

2 Roads to Redemption - Thoughts on XSS and SQLIA
2 Roads to Redemption - Thoughts on XSS and SQLIA2 Roads to Redemption - Thoughts on XSS and SQLIA
2 Roads to Redemption - Thoughts on XSS and SQLIA
 
AI for security or security for AI - Sergey Gordeychik
AI for security or security for AI - Sergey GordeychikAI for security or security for AI - Sergey Gordeychik
AI for security or security for AI - Sergey Gordeychik
 
The Economies of Scaling Software - Josh Long and Abdelmonaim Remani
The Economies of Scaling Software - Josh Long and Abdelmonaim RemaniThe Economies of Scaling Software - Josh Long and Abdelmonaim Remani
The Economies of Scaling Software - Josh Long and Abdelmonaim Remani
 
The Economies of Scaling Software - Josh Long and Abdelmonaim Remani
The Economies of Scaling Software - Josh Long and Abdelmonaim RemaniThe Economies of Scaling Software - Josh Long and Abdelmonaim Remani
The Economies of Scaling Software - Josh Long and Abdelmonaim Remani
 
Stuxnet redux. malware attribution & lessons learned
Stuxnet redux. malware attribution & lessons learnedStuxnet redux. malware attribution & lessons learned
Stuxnet redux. malware attribution & lessons learned
 
Stop expecting magic fairy dust: Make apps secure by design
Stop expecting magic fairy dust: Make apps secure by designStop expecting magic fairy dust: Make apps secure by design
Stop expecting magic fairy dust: Make apps secure by design
 
Virtual Machines Security Internals: Detection and Exploitation
 Virtual Machines Security Internals: Detection and Exploitation Virtual Machines Security Internals: Detection and Exploitation
Virtual Machines Security Internals: Detection and Exploitation
 
TADSummit, DataArt Keynote: Security in Virtualized Telecom Networks Michael ...
TADSummit, DataArt Keynote: Security in Virtualized Telecom Networks Michael ...TADSummit, DataArt Keynote: Security in Virtualized Telecom Networks Michael ...
TADSummit, DataArt Keynote: Security in Virtualized Telecom Networks Michael ...
 
Secure Because Math: A Deep-Dive on Machine Learning-Based Monitoring (#Secur...
Secure Because Math: A Deep-Dive on Machine Learning-Based Monitoring (#Secur...Secure Because Math: A Deep-Dive on Machine Learning-Based Monitoring (#Secur...
Secure Because Math: A Deep-Dive on Machine Learning-Based Monitoring (#Secur...
 
Armo webinar rethinking your cloud security in the shadow of the solar winds ...
Armo webinar rethinking your cloud security in the shadow of the solar winds ...Armo webinar rethinking your cloud security in the shadow of the solar winds ...
Armo webinar rethinking your cloud security in the shadow of the solar winds ...
 
Elastc Search
Elastc SearchElastc Search
Elastc Search
 
Chaos engineering & Gameday on AWS
Chaos engineering & Gameday on AWSChaos engineering & Gameday on AWS
Chaos engineering & Gameday on AWS
 
Security of Web Applications: Top 6 Risks To Avoid
Security of Web Applications: Top 6 Risks To AvoidSecurity of Web Applications: Top 6 Risks To Avoid
Security of Web Applications: Top 6 Risks To Avoid
 
Digital Security by Design: Security and Legacy at Microsoft - Matthew Parkin...
Digital Security by Design: Security and Legacy at Microsoft - Matthew Parkin...Digital Security by Design: Security and Legacy at Microsoft - Matthew Parkin...
Digital Security by Design: Security and Legacy at Microsoft - Matthew Parkin...
 
Cisco OpenSOC
Cisco OpenSOCCisco OpenSOC
Cisco OpenSOC
 
Felicitous Computing (invited Talk for UC Irvine ISR Distinguished Speaker Se...
Felicitous Computing (invited Talk for UC Irvine ISR Distinguished Speaker Se...Felicitous Computing (invited Talk for UC Irvine ISR Distinguished Speaker Se...
Felicitous Computing (invited Talk for UC Irvine ISR Distinguished Speaker Se...
 
Integration&SOA_v0.2
Integration&SOA_v0.2Integration&SOA_v0.2
Integration&SOA_v0.2
 
Why haven't we stamped out SQL injection and XSS yet
Why haven't we stamped out SQL injection and XSS yetWhy haven't we stamped out SQL injection and XSS yet
Why haven't we stamped out SQL injection and XSS yet
 
AI & ML in Cyber Security - Why Algorithms are Dangerous
AI & ML in Cyber Security - Why Algorithms are DangerousAI & ML in Cyber Security - Why Algorithms are Dangerous
AI & ML in Cyber Security - Why Algorithms are Dangerous
 
AI & ML in Cyber Security - Why Algorithms are Dangerous
AI & ML in Cyber Security - Why Algorithms are DangerousAI & ML in Cyber Security - Why Algorithms are Dangerous
AI & ML in Cyber Security - Why Algorithms are Dangerous
 

Recently uploaded

VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...Suhani Kapoor
 
Industrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfIndustrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfLars Albertsson
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfLars Albertsson
 
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /WhatsappsBeautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsappssapnasaifi408
 
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptdokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptSonatrach
 
100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptxAnupama Kate
 
(ISHITA) Call Girls Service Hyderabad Call Now 8617697112 Hyderabad Escorts
(ISHITA) Call Girls Service Hyderabad Call Now 8617697112 Hyderabad Escorts(ISHITA) Call Girls Service Hyderabad Call Now 8617697112 Hyderabad Escorts
(ISHITA) Call Girls Service Hyderabad Call Now 8617697112 Hyderabad EscortsCall girls in Ahmedabad High profile
 
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfKantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfSocial Samosa
 
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一ffjhghh
 
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfMarinCaroMartnezBerg
 
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Callshivangimorya083
 
CebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptxCebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptxolyaivanovalion
 
Brighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingBrighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingNeil Barnes
 
BigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxBigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxolyaivanovalion
 
Invezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz1
 
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...Suhani Kapoor
 

Recently uploaded (20)

VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
 
Industrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfIndustrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdf
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
 
Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdf
 
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /WhatsappsBeautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
 
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptdokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
 
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
 
100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx
 
(ISHITA) Call Girls Service Hyderabad Call Now 8617697112 Hyderabad Escorts
(ISHITA) Call Girls Service Hyderabad Call Now 8617697112 Hyderabad Escorts(ISHITA) Call Girls Service Hyderabad Call Now 8617697112 Hyderabad Escorts
(ISHITA) Call Girls Service Hyderabad Call Now 8617697112 Hyderabad Escorts
 
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in  KishangarhDelhi 99530 vip 56974 Genuine Escort Service Call Girls in  Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
 
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfKantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
 
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
 
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdf
 
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
 
CebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptxCebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptx
 
Brighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingBrighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data Storytelling
 
BigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxBigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptx
 
Invezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signals
 
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
 

Of Search Lights and Blind Spots: Machine Learning in Cybersecurity

  • 1. 2020 CROWDSTRIKE, INC. ALL RIGHTS RESERVED. OF SEARCH LIGHTS AND BLIND SPOTS: MACHINE LEARNING IN CYBERSECURITY SVEN KRASSER, CHIEF SCIENTIST, CROWDSTRIKE
  • 2. WHO? § CrowdStrike § Endpoint protection & breach prevention § Endpoint sensor connecting to Cloud § Processing 3 trillion events per week § My team: Data Science § Malware and threat research § Sandbox and dynamic analysis § Data engineering § Machine Learning research § Machine Learning software development § Hybrid-Analysis.com 2020 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
  • 4. 2020 CROWDSTRIKE, INC. ALL RIGHTS RESERVED. LONG-TIME USE BEHIND THE SCENES
  • 6. MECHANICS & ENGINEERS* * Loosely quoted from an unattributed ML researcher THE DEMOCRATIZATION OF ML
  • 7. NEW CHALLENGES "ML as panacea" “ML is inherently safe” ML monoculture ML performance is poorly understood
  • 9. PROJECTIONS THROUGH 2022 Source: Gartner (2019) 75%Data governance initiatives not adequately considering AI security risks, resulting in financial loss 30%Cyberattacks leveraging data poisoning, model theft, or adversarial samples 2020 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
  • 10. “DO YOU SECURE YOUR ML SYSTEMS TODAY?" Source: Shankar et al., “Adversarial Machine Learning – Industry Perspectives” (2020) 14%* “Yes” 2020 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.* ⅓ of organizations polled are in the cybersecurity space
  • 12.
  • 13. WHY TALK ABOUT THIS FIELD TODAY? § Data is plentiful and unencumbered § Challenges translate into other domains § Static analysis, while limited, is a cheap workhorse § Reducing volume of low-effort attacks § Saving compute (and hence dollars) for more complex analysis § Pre-execution detection § Detection on-the-wire (attachment) and at rest (storage)
  • 14. 2020 CROWDSTRIKE, INC. ALL RIGHTS RESERVED. AV Update New M alware 1 Day AV Update DetectionRate
  • 15. 2020 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
  • 16. BASERATE CHALLENGES 125,000 Executables on an average hard disk 20,000 Process executions per day 2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
  • 18. 2020 CROWDSTRIKE, INC. ALL RIGHTS RESERVED. HOW THE GAME WAS PLAYED Manual evasions and corresponding countermeasures
  • 19. 2020 CROWDSTRIKE, INC. ALL RIGHTS RESERVED. Hashbusting Polymorphism Packing Droppers File Infectors/Hiding in Regular Files Wrapped Scripts TRADITIONAL ATTACKER ARSENAL
  • 21. ① Adversaries focus on traditional evasions, which stick out to ML ② Adversaries target ML blind spots ③ Adversaries leverage ML for robust evasions The panacea “track”
  • 22. 0.53 0.28 0.17 0.67 0.56 0.55 0.03 0.04 0.54 0.15 0.56 0.90 0.62 0.97 0.52 0.61 0.82 0.24 0.87 0.36 0.94 0.60 0.53 0.27 0.59 0.63 0.32 0.89 0.91 0.83 0.07 0.57 0.05 0.56 0.95 0.98 0.89 0.24 0.64 0.24 0.45 0.37 0.68 0.25 0.21 0.10 0.52 0.42 0.77 0.11 0.21 0.47 0.05 0.03 0.42 0.96 0.68 0.41 0.96 0.30 0.60 0.50 0.67 0.47 0.80 0.48 0.02 0.53 0.10 0.32 1.00 0.28 0.42 0.31 0.43 0.77 0.11 0.67 0.43 0.31 0.11 0.11 0.70 0.16 0.53 0.58 0.97 0.10 0.83 0.29 0.61 0.31 0.61 0.35 0.03 0.01 0.44 0.77 0.92 0.72 0.26 0.24 0.26 0.03 0.26 0.02 0.35 0.99 0.90 0.03 0.05 0.19 0.27 0.67 0.04 0.48 0.66 0.93 0.04 0.14 0.68 0.69 0.60 0.43 0.12 0.42 0.31 0.74 0.05 0.00 0.98 0.37 0.78 0.46 0.28 0.89 0.01 0.98 0.59 0.75 0.74 0.54 0.63 0.85 0.65 0.22 0.80 0.87 0.82 0.03 0.43 0.91 0.32 0.35 0.21 0.70 0.84 0.36 0.99 0.19 0.92 0.49 0.21 0.50 0.77 0.52 0.60 0.69 0.49 0.38 0.54 0.51 0.07 0.12 0.41 0.40 0.76 0.56 0.20 0.54 0.78 0.61 0.14 0.69 0.39 0.99 0.21 0.90 0.42 0.95 0.09 0.51 0.23 0.22 0.93 0.54 0.00 0.62 0.27 0.98 Problem Space Feature Space Realizable Files
  • 23. WORKING IN FEATURE SPACE § Choosing a feature space that always produces realizable files § Such as specific binary traits that can be added (but not necessarily removed), e.g. Al-Dujaili et al. (2018) § Imported function names, resources, sections, strings, digital signature, etc. § Similar to how an adversary would attack the model § Use a substitute model with such a feature space to attack a blackbox model § E.g. MalGAN, Hu and Tan (2017) § Create (likely) unrealizable feature vectors with some utility § Not a realizable attack but allows better preparing for one § Increasing robustness at training time § Creating pseudo variants for test time (“new family” scenario)
  • 24. WORKING IN PROBLEM SPACE A look at both realizable and real-world attacks 2020 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
  • 25. Ashkenazy and Zini (2019) “CHAFF” ATTACK § Attack on a security vendor production model deployed on endpoints § Unconstrained sparse string-based features § “This string exists somewhere in the file” § Likely heavily weighted § Non-monotonic model § Extracting strings from files from the product’s whitelist § How to toggle the corresponding features? § Add the string somewhere § Appending to the end of a Portable Executable (the “overlay”) generally keeps the executable working § à All realizable § Bypass achieved 2020 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
  • 26. Winning Offensive Solution – Fleshman (2019) ML STATIC EVASION COMPETITION § Modify malware to bypass 3 non-production research models § MalConv (DNN, raw bytes) § Non-negative MalConv § EMBER (engineered features and LightGBM; Anderson and Roth, 2018) § Modified files are verified in a sandbox environment § DNN models have only unconstrained features (data anywhere can nudge) § EMBER has some unconstrained features § Byte entropy histogram (continuous features) § Strings § Data injected in various areas § Overlay § New sections § Empty space at end of sections (alignment) § Bypass achieved 2020 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
  • 27. Anderson et al. (2018) LEARNING TO EVADE § Reinforcement Learning approach to pick the best sequence of modifications to achieve evasiveness § Action space § Modest evasiveness achieved (but no manual intervention as in previous two approaches) 2020 CROWDSTRIKE, INC. ALL RIGHTS RESERVED. Add import Change section names Create section Appending data to sections New EP that jumps to original EP Removing signer info Changing debug info Packing Unpacking Breaking header checksum Add to overlay Etc.
  • 28. Elkind (2019) MITIGATING THROUGH REGULARIZATION § Premise § We know of several perturbation techniques resulting in realizable attacks § We want the model to ignore such modifications without constraining the feature space and reducing expressiveness § Pairwise Hidden Regularization § Penalize differences in hidden representations ℎ() in DNN between original file 𝑥 and perturbed file %𝑥 § min 𝐿𝑜𝑠𝑠 𝜃 + 𝜆 ℎ 𝑥, 𝜃 − ℎ(%𝑥, 𝜃) ! § Training on perturbed pairs § Notionally, perturbed files have a modified overlay (appended data) § Other modifications can be implemented accordingly (e.g. adding sections) § Models more robust; evasions more expensive 2020 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
  • 29. CONCLUSIONS Educating decision makers about ML Off-the-shelf guardrails; best practices for safety Cost reduction for the adversary; means to increase it again Opportunity for defenders to achieve higher levels of robustness Detectability; avoid silent failure