Skip to main content

Showing 1–16 of 16 results for author: Bosansky, B

.
  1. arXiv:2404.09352  [pdf, other

    cs.CR cs.AI

    Counteracting Concept Drift by Learning with Future Malware Predictions

    Authors: Branislav Bosansky, Lada Hospodkova, Michal Najman, Maria Rigaki, Elnaz Babayeva, Viliam Lisy

    Abstract: The accuracy of deployed malware-detection classifiers degrades over time due to changes in data distributions and increasing discrepancies between training and testing data. This phenomenon is known as the concept drift. While the concept drift can be caused by various reasons in general, new malicious files are created by malware authors with a clear intention of avoiding detection. The existenc… ▽ More

    Submitted 14 April, 2024; originally announced April 2024.

  2. arXiv:2402.19027  [pdf, other

    cs.CR cs.AI

    How to Train your Antivirus: RL-based Hardening through the Problem-Space

    Authors: Jacopo Cortellazzi, Ilias Tsingenopoulos, Branislav Bošanský, Simone Aonzo, Davy Preuveneers, Wouter Joosen, Fabio Pierazzi, Lorenzo Cavallaro

    Abstract: ML-based malware detection on dynamic analysis reports is vulnerable to both evasion and spurious correlations. In this work, we investigate a specific ML architecture employed in the pipeline of a widely-known commercial antivirus company, with the goal to harden it against adversarial malware. Adversarial training, the sole defensive technique that can confer empirical robustness, is not applica… ▽ More

    Submitted 29 February, 2024; originally announced February 2024.

    Comments: 20 pages,4 figures

  3. Cyber Deception against Zero-day Attacks: A Game Theoretic Approach

    Authors: Md Abu Sayed, Ahmed H. Anwar, Christopher Kiekintveld, Branislav Bosansky, Charles Kamhoua

    Abstract: Reconnaissance activities precedent other attack steps in the cyber kill chain. Zero-day attacks exploit unknown vulnerabilities and give attackers the upper hand against conventional defenses. Honeypots have been used to deceive attackers by misrepresenting the true state of the network. Existing work on cyber deception does not model zero-day attacks. In this paper, we address the question of "H… ▽ More

    Submitted 25 July, 2023; v1 submitted 24 July, 2023; originally announced July 2023.

    Comments: 20 pages, 1 citation

    Journal ref: International Conference on Decision and Game Theory for Security, pp. 44-63. Cham: Springer International Publishing, 2022

  4. arXiv:2209.03188  [pdf, other

    cs.CR cs.AI cs.LG

    Avast-CTU Public CAPE Dataset

    Authors: Branislav Bosansky, Dominik Kouba, Ondrej Manhal, Thorsten Sick, Viliam Lisy, Jakub Kroustek, Petr Somol

    Abstract: There is a limited amount of publicly available data to support research in malware analysis technology. Particularly, there are virtually no publicly available datasets generated from rich sandboxes such as Cuckoo/CAPE. The benefit of using dynamic sandboxes is the realistic simulation of file execution in the target machine and obtaining a log of such execution. The machine can be infected by ma… ▽ More

    Submitted 6 September, 2022; originally announced September 2022.

  5. arXiv:2208.02694  [pdf, ps, other

    stat.ML cs.LG

    Explaining Classifiers Trained on Raw Hierarchical Multiple-Instance Data

    Authors: Tomáš Pevný, Viliam Lisý, Branislav Bošanský, Petr Somol, Michal Pěchouček

    Abstract: Learning from raw data input, thus limiting the need for feature engineering, is a component of many successful applications of machine learning methods in various domains. While many problems naturally translate into a vector representation directly usable in standard classifiers, a number of data sources have the natural form of structured data interchange formats (e.g., security logs in JSON/XM… ▽ More

    Submitted 4 August, 2022; originally announced August 2022.

  6. arXiv:2111.02111  [pdf, ps, other

    cs.GT

    Computing Stackelberg Equilibrium with Memory in Sequential Games

    Authors: Aditya Aradhye, Branislav Bošanský, Michael Hlaváček

    Abstract: Stackelberg equilibrium is a solution concept that describes optimal strategies to commit: Player 1 (the leader) first commits to a strategy that is publicly announced, then Player 2 (the follower) plays a best response to the leader's commitment. We study the problem of computing Stackelberg equilibria in sequential games with finite and indefinite horizons, when players can play history-dependen… ▽ More

    Submitted 3 November, 2021; originally announced November 2021.

  7. arXiv:2110.11987  [pdf, other

    cs.LG cs.CR

    Improving Robustness of Malware Classifiers using Adversarial Strings Generated from Perturbed Latent Representations

    Authors: Marek Galovic, Branislav Bosansky, Viliam Lisy

    Abstract: In malware behavioral analysis, the list of accessed and created files very often indicates whether the examined file is malicious or benign. However, malware authors are trying to avoid detection by generating random filenames and/or modifying used filenames with new versions of the malware. These changes represent real-world adversarial examples. The goal of this work is to generate realistic ad… ▽ More

    Submitted 22 October, 2021; originally announced October 2021.

    Comments: 35th Conference on Neural Information Processing Systems (NeurIPS 2021), Strategic ML Workshop

  8. arXiv:2010.11243  [pdf, other

    cs.GT

    Solving Zero-Sum One-Sided Partially Observable Stochastic Games

    Authors: Karel Horák, Branislav Bošanský, Vojtěch Kovařík, Christopher Kiekintveld

    Abstract: Many security and other real-world situations are dynamic in nature and can be modelled as strictly competitive (or zero-sum) dynamic games. In these domains, agents perform actions to affect the environment and receive observations -- possibly imperfect -- about the situation and the effects of the opponent's actions. Moreover, there is no limitation on the total number of actions an agent can pe… ▽ More

    Submitted 21 October, 2020; originally announced October 2020.

  9. arXiv:2004.10638  [pdf

    cs.LG cs.AI stat.ML

    Discovering Imperfectly Observable Adversarial Actions using Anomaly Detection

    Authors: Olga Petrova, Karel Durkota, Galina Alperovich, Karel Horak, Michal Najman, Branislav Bosansky, Viliam Lisy

    Abstract: Anomaly detection is a method for discovering unusual and suspicious behavior. In many real-world scenarios, the examined events can be directly linked to the actions of an adversary, such as attacks on computer networks or frauds in financial operations. While the defender wants to discover such malicious behavior, the attacker seeks to accomplish their goal (e.g., exfiltrating data) while avoidi… ▽ More

    Submitted 22 April, 2020; originally announced April 2020.

    Comments: 9 pages, 3 figures, 3 tables. Extended Abstract of this paper is accepted to AAMAS 2020

    MSC Class: 91A80 (Primary); 68T99 (Secondary) ACM Class: I.2.6; G.3

  10. arXiv:1903.05511  [pdf, other

    cs.GT

    Compact Representation of Value Function in Partially Observable Stochastic Games

    Authors: Karel Horák, Branislav Bošanský, Christopher Kiekintveld, Charles Kamhoua

    Abstract: Value methods for solving stochastic games with partial observability model the uncertainty about states of the game as a probability distribution over possible states. The dimension of this belief space is the number of states. For many practical problems, for example in security, there are exponentially many possible states which causes an insufficient scalability of algorithms for real-world pr… ▽ More

    Submitted 13 March, 2019; originally announced March 2019.

  11. Automated Construction of Bounded-Loss Imperfect-Recall Abstractions in Extensive-Form Games

    Authors: Jiri Cermak, Viliam Lisy, Branislav Bosansky

    Abstract: Extensive-form games (EFGs) model finite sequential interactions between players. The amount of memory required to represent these games is the main bottleneck of algorithms for computing optimal strategies and the size of these strategies is often impractical for real-world applications. A common approach to tackle the memory bottleneck is to use information abstraction that removes parts of info… ▽ More

    Submitted 15 April, 2020; v1 submitted 14 March, 2018; originally announced March 2018.

    Journal ref: Cermak, Jiri, Viliam Lisy, and Branislav Bosansky. "Automated construction of bounded-loss imperfect-recall abstractions in extensive-form games." Artificial Intelligence 282 (2020): 103248

  12. arXiv:1608.01510  [pdf, ps, other

    cs.GT

    Computing Maxmin Strategies in Extensive-Form Zero-Sum Games with Imperfect Recall

    Authors: Branislav Bosansky, Jiri Cermak, Karel Horak, Michal Pechoucek

    Abstract: Extensive-form games with imperfect recall are an important game-theoretic model that allows a compact representation of strategies in dynamic strategic interactions. Practical use of imperfect recall games is limited due to negative theoretical results: a Nash equilibrium does not have to exist, computing maxmin strategies is NP-hard, and they may require irrational numbers. We present the first… ▽ More

    Submitted 24 May, 2017; v1 submitted 4 August, 2016; originally announced August 2016.

  13. arXiv:1608.01500   

    cs.GT

    Solution Concepts in A-Loss Recall Games: Existence and Computational Complexity

    Authors: Jiri Cermak, Branislav Bosansky, Michal Pechoucek

    Abstract: Imperfect recall games represent dynamic interactions where players forget previously known information, such as a history of played actions. The importance of imperfect recall games stems from allowing a concise representation of strategies compared to perfect recall games where players remember all information. However, most of the algorithmic results are negative for imperfect recall games -- a… ▽ More

    Submitted 24 May, 2017; v1 submitted 4 August, 2016; originally announced August 2016.

    Comments: errors in the paper

  14. arXiv:1606.06271  [pdf, other

    cs.GT

    Dynamic Programming for One-Sided Partially Observable Pursuit-Evasion Games

    Authors: Karel Horák, Branislav Bošanský

    Abstract: Pursuit-evasion scenarios appear widely in robotics, security domains, and many other real-world situations. We focus on two-player pursuit-evasion games with concurrent moves, infinite horizon, and discounted rewards. We assume that the players have a partial observability, however, the evader is given an advantage of knowing the current position of the units of the pursuer. This setting is parti… ▽ More

    Submitted 4 August, 2016; v1 submitted 20 June, 2016; originally announced June 2016.

  15. arXiv:1507.07677  [pdf, other

    cs.GT cs.AI

    Computation of Stackelberg Equilibria of Finite Sequential Games

    Authors: Branislav Bosansky, Simina Branzei, Kristoffer Arnsfelt Hansen, Peter Bro Miltersen, Troels Bjerre Sorensen

    Abstract: The Stackelberg equilibrium solution concept describes optimal strategies to commit to: Player 1 (termed the leader) publicly commits to a strategy and Player 2 (termed the follower) plays a best response to this strategy (ties are broken in favor of the leader). We study Stackelberg equilibria in finite sequential games (or extensive-form games) and provide new exact algorithms, approximate algor… ▽ More

    Submitted 23 August, 2016; v1 submitted 28 July, 2015; originally announced July 2015.

  16. arXiv:1310.8613  [pdf, other

    cs.GT

    Convergence of Monte Carlo Tree Search in Simultaneous Move Games

    Authors: Viliam Lisý, Vojtěch Kovařík, Marc Lanctot, Branislav Bošanský

    Abstract: We study Monte Carlo tree search (MCTS) in zero-sum extensive-form games with perfect information and simultaneous moves. We present a general template of MCTS algorithms for these games, which can be instantiated by various selection methods. We formally prove that if a selection method is $ε$-Hannan consistent in a matrix game and satisfies additional requirements on exploration, then the MCTS a… ▽ More

    Submitted 5 November, 2013; v1 submitted 31 October, 2013; originally announced October 2013.

    Comments: NIPS 2013 paper including appendix

    Journal ref: Advances in Neural Information Processing Systems 26, pp 2112-2120, 2013