Skip to main content

Showing 1–6 of 6 results for author: Tygar, J D

Searching in archive cs. Search in all archives.
.
  1. arXiv:1510.07338  [pdf, other

    cs.CR

    Reviewer Integration and Performance Measurement for Malware Detection

    Authors: Brad Miller, Alex Kantchelian, Michael Carl Tschantz, Sadia Afroz, Rekha Bachwani, Riyaz Faizullabhoy, Ling Huang, Vaishaal Shankar, Tony Wu, George Yiu, Anthony D. Joseph, J. D. Tygar

    Abstract: We present and evaluate a large-scale malware detection system integrating machine learning with expert reviewers, treating reviewers as a limited labeling resource. We demonstrate that even in small numbers, reviewers can vastly improve the system's ability to keep pace with evolving threats. We conduct our evaluation on a sample of VirusTotal submissions spanning 2.5 years and containing 1.1 mil… ▽ More

    Submitted 26 May, 2016; v1 submitted 25 October, 2015; originally announced October 2015.

    Comments: 20 papers, 11 figures, accepted at the 13th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2016)

  2. arXiv:1509.07892  [pdf, other

    cs.LG cs.CR stat.ML

    Evasion and Hardening of Tree Ensemble Classifiers

    Authors: Alex Kantchelian, J. D. Tygar, Anthony D. Joseph

    Abstract: Classifier evasion consists in finding for a given instance $x$ the nearest instance $x'$ such that the classifier predictions of $x$ and $x'$ are different. We present two novel algorithms for systematically computing evasions for tree ensembles such as boosted trees and random forests. Our first algorithm uses a Mixed Integer Linear Program solver and finds the optimal evading instance under an… ▽ More

    Submitted 26 May, 2016; v1 submitted 25 September, 2015; originally announced September 2015.

    Comments: 11 pages, 7 figures, Appears in Proceedings of the 33rd International Conference on Machine Learning (ICML), New York, NY, USA, 2016. JMLR: W&CP volume 48

  3. arXiv:1409.3211  [pdf, other

    cs.CR

    On Modeling the Costs of Censorship

    Authors: Michael Carl Tschantz, Sadia Afroz, Vern Paxson, J. D. Tygar

    Abstract: We argue that the evaluation of censorship evasion tools should depend upon economic models of censorship. We illustrate our position with a simple model of the costs of censorship. We show how this model makes suggestions for how to evade censorship. In particular, from it, we develop evaluation criteria. We examine how our criteria compare to the traditional methods of evaluation employed in pri… ▽ More

    Submitted 10 September, 2014; originally announced September 2014.

  4. arXiv:1403.0297  [pdf, other

    cs.CR

    I Know Why You Went to the Clinic: Risks and Realization of HTTPS Traffic Analysis

    Authors: Brad Miller, Ling Huang, A. D. Joseph, J. D. Tygar

    Abstract: Revelations of large scale electronic surveillance and data mining by governments and corporations have fueled increased adoption of HTTPS. We present a traffic analysis attack against over 6000 webpages spanning the HTTPS deployments of 10 widely used, industry-leading websites in areas such as healthcare, finance, legal services and streaming video. Our attack identifies individual pages in the… ▽ More

    Submitted 2 March, 2014; originally announced March 2014.

  5. arXiv:1007.0484  [pdf, ps, other

    cs.LG cs.CR cs.GT

    Query Strategies for Evading Convex-Inducing Classifiers

    Authors: Blaine Nelson, Benjamin I. P. Rubinstein, Ling Huang, Anthony D. Joseph, Steven J. Lee, Satish Rao, J. D. Tygar

    Abstract: Classifiers are often used to detect miscreant activities. We study how an adversary can systematically query a classifier to elicit information that allows the adversary to evade detection while incurring a near-minimal cost of modifying their intended malfeasance. We generalize the theory of Lowd and Meek (2005) to the family of convex-inducing classifiers that partition input space into two set… ▽ More

    Submitted 3 July, 2010; originally announced July 2010.

  6. arXiv:1003.2751  [pdf, other

    cs.LG cs.CR

    Near-Optimal Evasion of Convex-Inducing Classifiers

    Authors: Blaine Nelson, Benjamin I. P. Rubinstein, Ling Huang, Anthony D. Joseph, Shing-hon Lau, Steven J. Lee, Satish Rao, Anthony Tran, J. D. Tygar

    Abstract: Classifiers are often used to detect miscreant activities. We study how an adversary can efficiently query a classifier to elicit information that allows the adversary to evade detection at near-minimal cost. We generalize results of Lowd and Meek (2005) to convex-inducing classifiers. We present algorithms that construct undetected instances of near-minimal cost using only polynomially many queri… ▽ More

    Submitted 13 March, 2010; originally announced March 2010.

    Comments: 8 pages; to appear at AISTATS'2010