Skip to main content

Showing 1–6 of 6 results for author: Kazdagli, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2402.10985  [pdf, other

    cs.CR cs.AI

    CloudLens: Modeling and Detecting Cloud Security Vulnerabilities

    Authors: Mikhail Kazdagli, Mohit Tiwari, Akshat Kumar

    Abstract: Cloud computing services provide scalable and cost-effective solutions for data storage, processing, and collaboration. With their growing popularity, concerns about security vulnerabilities are increasing. To address this, first, we provide a formal model, called CloudLens, that expresses relations between different cloud objects such as users, datastores, security roles, representing access cont… ▽ More

    Submitted 23 December, 2024; v1 submitted 15 February, 2024; originally announced February 2024.

  2. arXiv:2205.01240  [pdf, ps, other

    cs.CR cs.AI

    Using Constraint Programming and Graph Representation Learning for Generating Interpretable Cloud Security Policies

    Authors: Mikhail Kazdagli, Mohit Tiwari, Akshat Kumar

    Abstract: Modern software systems rely on mining insights from business sensitive data stored in public clouds. A data breach usually incurs significant (monetary) loss for a commercial organization. Conceptually, cloud security heavily relies on Identity Access Management (IAM) policies that IT admins need to properly configure and periodically update. Security negligence and human errors often lead to mis… ▽ More

    Submitted 13 June, 2022; v1 submitted 2 May, 2022; originally announced May 2022.

    Comments: to be published in IJCAI/ECAI'22

  3. arXiv:2004.14969  [pdf, other

    cs.IR cs.AI cs.CL

    Learning to Ask Screening Questions for Job Postings

    Authors: Baoxu Shi, Shan Li, Jaewon Yang, Mustafa Emre Kazdagli, Qi He

    Abstract: At LinkedIn, we want to create economic opportunity for everyone in the global workforce. A critical aspect of this goal is matching jobs with qualified applicants. To improve hiring efficiency and reduce the need to manually screening each applicant, we develop a new product where recruiters can ask screening questions online so that they can filter qualified candidates easily. To add screening q… ▽ More

    Submitted 30 April, 2020; originally announced April 2020.

    Comments: 10 pages, to appear in SIGIR2020

  4. arXiv:1803.00883  [pdf, other

    cs.CR

    The Shape of Alerts: Detecting Malware Using Distributed Detectors by Robustly Amplifying Transient Correlations

    Authors: Mikhail Kazdagli, Constantine Caramanis, Sanjay Shakkottai, Mohit Tiwari

    Abstract: We introduce a new malware detector - Shape-GD - that aggregates per-machine detectors into a robust global detector. Shape-GD is based on two insights: 1. Structural: actions such as visiting a website (waterhole attack) by nodes correlate well with malware spread, and create dynamic neighborhoods of nodes that were exposed to the same attack vector. However, neighborhood sizes vary unpredictably… ▽ More

    Submitted 1 March, 2018; originally announced March 2018.

    Comments: arXiv admin note: substantial text overlap with arXiv:1708.01864

  5. arXiv:1708.01864  [pdf, other

    cs.CR

    Exploiting Latent Attack Semantics for Intelligent Malware Detection

    Authors: Mkhail Kazdagli, Constantine Caramanis, Sanjay Shakkottai, Mohit Tiwari

    Abstract: Behavioral malware detectors promise to expose previously unknown malware and are an important security primitive. However, even the best behavioral detectors suffer from high false positives and negatives. In this paper, we address the challenge of aggregating weak per-device behavioral detectors in noisy communities (i.e., ones that produce alerts at unpredictable rates) into an accurate and rob… ▽ More

    Submitted 6 August, 2017; originally announced August 2017.

  6. arXiv:1603.03086  [pdf, other

    cs.CR

    EMMA: A New Platform to Evaluate Hardware-based Mobile Malware Analyses

    Authors: Mikhail Kazdagli, Ling Huang, Vijay Reddi, Mohit Tiwari

    Abstract: Hardware-based malware detectors (HMDs) are a key emerging technology to build trustworthy computing platforms, especially mobile platforms. Quantifying the efficacy of HMDs against malicious adversaries is thus an important problem. The challenge lies in that real-world malware typically adapts to defenses, evades being run in experimental settings, and hides behind benign applications. Thus, rea… ▽ More

    Submitted 10 March, 2016; v1 submitted 9 March, 2016; originally announced March 2016.