Skip to main content

Showing 1–3 of 3 results for author: Robinette, P K

.
  1. arXiv:2404.05703  [pdf, other

    cs.CR

    Case Study: Neural Network Malware Detection Verification for Feature and Image Datasets

    Authors: Preston K. Robinette, Diego Manzanas Lopez, Serena Serbinowska, Kevin Leach, Taylor T. Johnson

    Abstract: Malware, or software designed with harmful intent, is an ever-evolving threat that can have drastic effects on both individuals and institutions. Neural network malware classification systems are key tools for combating these threats but are vulnerable to adversarial machine learning attacks. These attacks perturb input data to cause misclassification, bypassing protective systems. Existing defens… ▽ More

    Submitted 8 April, 2024; originally announced April 2024.

    Comments: In International Conference On Formal Methods in Software Engineering, 2024; (FormaliSE'24)

  2. arXiv:2310.06951  [pdf, other

    cs.CR

    Monsters in the Dark: Sanitizing Hidden Threats with Diffusion Models

    Authors: Preston K. Robinette, Daniel Moyer, Taylor T. Johnson

    Abstract: Steganography is the art of hiding information in plain sight. This form of covert communication can be used by bad actors to propagate malware, exfiltrate victim data, and communicate with other bad actors. Current image steganography defenses rely upon steganalysis, or the detection of hidden messages. These methods, however, are non-blind as they require information about known steganography te… ▽ More

    Submitted 10 October, 2023; originally announced October 2023.

  3. SUDS: Sanitizing Universal and Dependent Steganography

    Authors: Preston K. Robinette, Hanchen D. Wang, Nishan Shehadeh, Daniel Moyer, Taylor T. Johnson

    Abstract: Steganography, or hiding messages in plain sight, is a form of information hiding that is most commonly used for covert communication. As modern steganographic mediums include images, text, audio, and video, this communication method is being increasingly used by bad actors to propagate malware, exfiltrate data, and discreetly communicate. Current protection mechanisms rely upon steganalysis, or t… ▽ More

    Submitted 23 September, 2023; originally announced September 2023.

    Comments: Accepted to European Conference on Artificial Intelligence (ECAI) 2023