108 research outputs found
ASAP: Automatic semantics-aware analysis of network payloads
Automatic inspection of network payloads is a prerequisite for effective analysis of network communication. Security research has largely focused on network analysis using protocol specifications, for example for intrusion detection, fuzz testing and forensic analysis. The specification of a protocol alone, however, is often not sufficient for accurate analysis of communication, as it fails to reflect individual semantics of network applications. We propose a framework for semantics-aware analysis of network payloads which automaticylly extracts semantic components from recorded network traffic. Our method proceeds by mapping network payloads to a vector space and identifying semantic templates corresponding to base directions in the vector space. We demonstrate the efficacy of semantics-aware analysis in different security applications: automatic discovery of patterns in honeypot data, analysis of malware communication and network intrusion detection
On the Detection of Image-Scaling Attacks in Machine Learning
Image scaling is an integral part of machine learning and computer vision
systems. Unfortunately, this preprocessing step is vulnerable to so-called
image-scaling attacks where an attacker makes unnoticeable changes to an image
so that it becomes a new image after scaling. This opens up new ways for
attackers to control the prediction or to improve poisoning and backdoor
attacks. While effective techniques exist to prevent scaling attacks, their
detection has not been rigorously studied yet. Consequently, it is currently
not possible to reliably spot these attacks in practice.
This paper presents the first in-depth systematization and analysis of
detection methods for image-scaling attacks. We identify two general detection
paradigms and derive novel methods from them that are simple in design yet
significantly outperform previous work. We demonstrate the efficacy of these
methods in a comprehensive evaluation with all major learning platforms and
scaling algorithms. First, we show that image-scaling attacks modifying the
entire scaled image can be reliably detected even under an adaptive adversary.
Second, we find that our methods provide strong detection performance even if
only minor parts of the image are manipulated. As a result, we can introduce a
novel protection layer against image-scaling attacks.Comment: Accepted at ACSAC'2
Recommended from our members
ASAP : automatic semantics-aware analysis of network payloads
Automatic inspection of network payloads is a prerequisite for
effective analysis of network communication. Security research has largely
focused on network analysis using protocol specifications, for example for
intrusion detection, fuzz testing and forensic analysis. The specification of
a protocol alone, however, is often not sufficient for accurate analysis of
communication, as it fails to reflect individual semantics of network
applications. We propose a framework for semantics-aware analysis of network
payloads which automaticylly extracts semantic components from recorded
network traffic. Our method proceeds by mapping network payloads to a vector
space and identifying semantic templates corresponding to base directions in
the vector space. We demonstrate the efficacy of semantics-aware analysis in
different security applications: automatic discovery of patterns in honeypot
data, analysis of malware communication and network intrusion detection
A malware instruction set for behavior-based analysis
We introduce a new representation for monitored behavior of malicious software called Malware Instruction Set (MIST). The representation is optimized for effective and efficient analysis of behavior using data mining and machine learning techniques. It can be obtained automatically during analysis of malware with a behavior monitoring tool or by converting existing behavior reports. The representation is not restricted to a particular monitoring tool and thus can also be used as a meta language to unify behavior reports of different sources
- …