Skip to main content

Showing 1–8 of 8 results for author: Suciu, O

.
  1. arXiv:2302.14172  [pdf, other

    cs.CR

    Enhancing Vulnerability Prioritization: Data-Driven Exploit Predictions with Community-Driven Insights

    Authors: Jay Jacobs, Sasha Romanosky, Octavian Suciu, Benjamin Edwards, Armin Sarabi

    Abstract: The number of disclosed vulnerabilities has been steadily increasing over the years. At the same time, organizations face significant challenges patching their systems, leading to a need to prioritize vulnerability remediation in order to reduce the risk of attacks. Unfortunately, existing vulnerability scoring systems are either vendor-specific, proprietary, or are only commercially available. Mo… ▽ More

    Submitted 15 June, 2023; v1 submitted 27 February, 2023; originally announced February 2023.

  2. arXiv:2102.07869  [pdf, other

    cs.CR

    Technical Report -- Expected Exploitability: Predicting the Development of Functional Vulnerability Exploits

    Authors: Octavian Suciu, Connor Nelson, Zhuoer Lyu, Tiffany Bao, Tudor Dumitras

    Abstract: Assessing the exploitability of software vulnerabilities at the time of disclosure is difficult and error-prone, as features extracted via technical analysis by existing metrics are poor predictors for exploit development. Moreover, exploitability assessments suffer from a class bias because "not exploitable" labels could be inaccurate. To overcome these challenges, we propose a new metric, called… ▽ More

    Submitted 3 February, 2022; v1 submitted 15 February, 2021; originally announced February 2021.

  3. arXiv:1810.08280  [pdf, other

    cs.LG cs.CR stat.ML

    Exploring Adversarial Examples in Malware Detection

    Authors: Octavian Suciu, Scott E. Coull, Jeffrey Johns

    Abstract: The convolutional neural network (CNN) architecture is increasingly being applied to new domains, such as malware detection, where it is able to learn malicious behavior from raw bytes extracted from executables. These architectures reach impressive performance with no feature engineering effort involved, but their robustness against active attackers is yet to be understood. Such malware detectors… ▽ More

    Submitted 13 April, 2019; v1 submitted 18 October, 2018; originally announced October 2018.

  4. arXiv:1804.00792  [pdf, other

    cs.LG cs.CR cs.CV stat.ML

    Poison Frogs! Targeted Clean-Label Poisoning Attacks on Neural Networks

    Authors: Ali Shafahi, W. Ronny Huang, Mahyar Najibi, Octavian Suciu, Christoph Studer, Tudor Dumitras, Tom Goldstein

    Abstract: Data poisoning is an attack on machine learning models wherein the attacker adds examples to the training set to manipulate the behavior of the model at test time. This paper explores poisoning attacks on neural nets. The proposed attacks use "clean-labels"; they don't require the attacker to have any control over the labeling of training data. They are also targeted; they control the behavior of… ▽ More

    Submitted 10 November, 2018; v1 submitted 2 April, 2018; originally announced April 2018.

    Comments: Presented at the NIPS 2018 conference. 11 pages, 4 figures, with a supplementary section of 7 pages, 7 figures. First two authors contributed equally

  5. arXiv:1803.06975  [pdf, other

    cs.CR cs.LG

    Technical Report: When Does Machine Learning FAIL? Generalized Transferability for Evasion and Poisoning Attacks

    Authors: Octavian Suciu, Radu Mărginean, Yiğitcan Kaya, Hal Daumé III, Tudor Dumitraş

    Abstract: Recent results suggest that attacks against supervised machine learning systems are quite effective, while defenses are easily bypassed by new attacks. However, the specifications for machine learning systems currently lack precise adversary definitions, and the existing attacks make diverse, potentially unrealistic assumptions about the strength of the adversary who launches them. We propose the… ▽ More

    Submitted 8 March, 2019; v1 submitted 19 March, 2018; originally announced March 2018.

  6. arXiv:1701.04739  [pdf, other

    cs.CR cs.LG

    Summoning Demons: The Pursuit of Exploitable Bugs in Machine Learning

    Authors: Rock Stevens, Octavian Suciu, Andrew Ruef, Sanghyun Hong, Michael Hicks, Tudor Dumitraş

    Abstract: Governments and businesses increasingly rely on data analytics and machine learning (ML) for improving their competitive edge in areas such as consumer satisfaction, threat intelligence, decision making, and product efficiency. However, by cleverly corrupting a subset of data used as input to a target's ML algorithms, an adversary can perturb outcomes and compromise the effectiveness of ML technol… ▽ More

    Submitted 17 January, 2017; originally announced January 2017.

  7. 739 observed NEAs and new 2-4m survey statistics within the EURONEAR network

    Authors: O. Vaduvescu, M. Birlan, A. Tudorica, M. Popescu, F. Colas, D. J. Asher, A. Sonka, O. Suciu, D. Lacatus, A. Paraschiv, T. Badescu, O. Tercu, A. Dumitriu, A. Chirila, B. Stecklum, J. Licandro, A. Nedelcu, E. Turcu, F. Vachier, L. Beauvalet, F. Taris, L. Bouquillon, F. Pozo Nunez, J. P. Colque Saavedra, E. Unda-Sanzana , et al. (14 additional authors not shown)

    Abstract: We report follow-up observations of 477 program Near-Earth Asteroids (NEAs) using nine telescopes of the EURONEAR network having apertures between 0.3 and 4.2 m. Adding these NEAs to our previous results we now count 739 program NEAs followed-up by the EURONEAR network since 2006. The targets were selected using EURONEAR planning tools focusing on high priority objects. Analyzing the resulting orb… ▽ More

    Submitted 26 August, 2013; originally announced August 2013.

    Comments: Published in Planetary and Space Sciences (Sep 2013)

    Journal ref: 2013P&SS...85..299V

  8. arXiv:1301.6902  [pdf, ps, other

    astro-ph.EP astro-ph.IM

    Mining the ESO WFI and INT WFC archives for known Near Earth Asteroids. Mega-Precovery software

    Authors: O. Vaduvescu, M. Popescu, I. Comsa, A. Paraschiv, D. Lacatus, A. Sonka, A. Tudorica, M. Birlan, O. Suciu, F. Char, M. Constantinescu, T. Badescu, M. Badea, D. Vidican, C. Opriseanu

    Abstract: The ESO/MPG WFI and the INT WFC wide field archives comprising 330,000 images were mined to search for serendipitous encounters of known Near Earth Asteroids (NEAs) and Potentially Hazardous Asteroids (PHAs). A total of 152 asteroids (44 PHAs and 108 other NEAs) were identified using the PRECOVERY software, their astrometry being measured on 761 images and sent to the Minor Planet Centre. Both rec… ▽ More

    Submitted 29 January, 2013; originally announced January 2013.

    Comments: Accepted for publication in Astronomische Nachrichten (Sep 2012)