Skip to main content

Showing 1–10 of 10 results for author: Verma, E

.
  1. arXiv:2407.04797  [pdf, other

    cs.CV cs.LG

    Revealing the Utilized Rank of Subspaces of Learning in Neural Networks

    Authors: Isha Garg, Christian Koguchi, Eshan Verma, Daniel Ulbricht

    Abstract: In this work, we study how well the learned weights of a neural network utilize the space available to them. This notion is related to capacity, but additionally incorporates the interaction of the network architecture with the dataset. Most learned weights appear to be full rank, and are therefore not amenable to low rank decomposition. This deceptively implies that the weights are utilizing the… ▽ More

    Submitted 5 July, 2024; originally announced July 2024.

    Comments: Presented at Efficient Systems for Foundation Models Workshop at the International Conference on Machine Learning (ICML) 2024

  2. arXiv:2404.13660  [pdf, other

    cs.CL

    Trojan Detection in Large Language Models: Insights from The Trojan Detection Challenge

    Authors: Narek Maloyan, Ekansh Verma, Bulat Nutfullin, Bislan Ashinov

    Abstract: Large Language Models (LLMs) have demonstrated remarkable capabilities in various domains, but their vulnerability to trojan or backdoor attacks poses significant security risks. This paper explores the challenges and insights gained from the Trojan Detection Competition 2023 (TDC2023), which focused on identifying and evaluating trojan attacks on LLMs. We investigate the difficulty of distinguish… ▽ More

    Submitted 21 April, 2024; originally announced April 2024.

  3. arXiv:2308.14835  [pdf, other

    cs.CR

    AI ATAC 1: An Evaluation of Prominent Commercial Malware Detectors

    Authors: Robert A. Bridges, Brian Weber, Justin M. Beaver, Jared M. Smith, Miki E. Verma, Savannah Norem, Kevin Spakes, Cory Watson, Jeff A. Nichols, Brian Jewell, Michael. D. Iannacone, Chelsey Dunivan Stahl, Kelly M. T. Huffer, T. Sean Oesch

    Abstract: This work presents an evaluation of six prominent commercial endpoint malware detectors, a network malware detector, and a file-conviction algorithm from a cyber technology vendor. The evaluation was administered as the first of the Artificial Intelligence Applications to Autonomous Cybersecurity (AI ATAC) prize challenges, funded by / completed in service of the US Navy. The experiment employed 1… ▽ More

    Submitted 28 August, 2023; originally announced August 2023.

  4. Time-Based CAN Intrusion Detection Benchmark

    Authors: Deborah H. Blevins, Pablo Moriano, Robert A. Bridges, Miki E. Verma, Michael D. Iannacone, Samuel C Hollifield

    Abstract: Modern vehicles are complex cyber-physical systems made of hundreds of electronic control units (ECUs) that communicate over controller area networks (CANs). This inherited complexity has expanded the CAN attack surface which is vulnerable to message injection attacks. These injections change the overall timing characteristics of messages on the bus, and thus, to detect these malicious messages, t… ▽ More

    Submitted 14 January, 2021; originally announced January 2021.

    Comments: 7 pages, 2 figures

    Journal ref: Workshop on Automotive and Autonomous Vehicle Security (AutoSec) 2021

  5. A Comprehensive Guide to CAN IDS Data & Introduction of the ROAD Dataset

    Authors: Miki E. Verma, Robert A. Bridges, Michael D. Iannacone, Samuel C. Hollifield, Pablo Moriano, Steven C. Hespeler, Bill Kay, Frank L. Combs

    Abstract: Although ubiquitous in modern vehicles, Controller Area Networks (CANs) lack basic security properties and are easily exploitable. A rapidly growing field of CAN security research has emerged that seeks to detect intrusions on CANs. Producing vehicular CAN data with a variety of intrusions is out of reach for most researchers as it requires expensive assets and expertise. To assist researchers, we… ▽ More

    Submitted 7 February, 2024; v1 submitted 28 December, 2020; originally announced December 2020.

    Comments: title changed and author added from original version

    Journal ref: PLoS one 19, no. 1 (2024): e0296879

  6. arXiv:2012.09214  [pdf, other

    cs.CR cs.LG

    Beyond the Hype: A Real-World Evaluation of the Impact and Cost of Machine Learning-Based Malware Detection

    Authors: Robert A. Bridges, Sean Oesch, Miki E. Verma, Michael D. Iannacone, Kelly M. T. Huffer, Brian Jewell, Jeff A. Nichols, Brian Weber, Justin M. Beaver, Jared M. Smith, Daniel Scofield, Craig Miles, Thomas Plummer, Mark Daniell, Anne M. Tall

    Abstract: In this paper, we present a scientific evaluation of four prominent malware detection tools to assist an organization with two primary questions: To what extent do ML-based tools accurately classify previously- and never-before-seen files? Is it worth purchasing a network-level malware detector? To identify weaknesses, we tested each tool against 3,536 total files (2,554 or 72\% malicious, 982 or… ▽ More

    Submitted 17 August, 2022; v1 submitted 16 December, 2020; originally announced December 2020.

    Comments: Includes Actionable Takeaways for SOCs

    Journal ref: Digital Threats: Research and Practice 2023

  7. arXiv:2010.03228  [pdf, other

    stat.ML cs.AI cs.LG

    FairMixRep : Self-supervised Robust Representation Learning for Heterogeneous Data with Fairness constraints

    Authors: Souradip Chakraborty, Ekansh Verma, Saswata Sahoo, Jyotishka Datta

    Abstract: Representation Learning in a heterogeneous space with mixed variables of numerical and categorical types has interesting challenges due to its complex feature manifold. Moreover, feature learning in an unsupervised setup, without class labels and a suitable learning loss function, adds to the problem complexity. Further, the learned representation and subsequent predictions should not reflect disc… ▽ More

    Submitted 14 October, 2020; v1 submitted 7 October, 2020; originally announced October 2020.

    Comments: This paper has been accepted at the ICDM'2020 DLC Workshop

  8. arXiv:2006.05993  [pdf, other

    cs.OH eess.SP

    CAN-D: A Modular Four-Step Pipeline for Comprehensively Decoding Controller Area Network Data

    Authors: Miki E. Verma, Robert A. Bridges, Jordan J. Sosnowski, Samuel C. Hollifield, Michael D. Iannacone

    Abstract: CANs are a broadcast protocol for real-time communication of critical vehicle subsystems. Original equipment manufacturers of passenger vehicles hold secret their map**s of CAN data to vehicle signals, and these definitions vary according to make, model, and year. Without these map**s, the wealth of real-time vehicle information hidden in the CAN packets is uninterpretable, impeding vehicle-re… ▽ More

    Submitted 22 June, 2021; v1 submitted 9 June, 2020; originally announced June 2020.

  9. arXiv:1811.07897  [pdf, other

    cs.OH stat.AP

    ACTT: Automotive CAN Tokenization and Translation

    Authors: Miki E. Verma, Robert A. Bridges, Samuel C. Hollifield

    Abstract: Modern vehicles contain scores of Electrical Control Units (ECUs) that broadcast messages over a Controller Area Network (CAN). Vehicle manufacturers rely on security through obscurity by concealing their unique map** of CAN messages to vehicle functions which differs for each make, model, year, and even trim. This poses a major obstacle for after-market modifications notably performance tuning… ▽ More

    Submitted 19 November, 2018; originally announced November 2018.

    Comments: 5th Annual Conference on Computational Science & Computational Intelligence (CSCI'18)

  10. arXiv:1811.00591  [pdf, other

    stat.AP cs.CR

    Defining a Metric Space of Host Logs and Operational Use Cases

    Authors: Miki E. Verma, Robert A. Bridges

    Abstract: Host logs, in particular, Windows Event Logs, are a valuable source of information often collected by security operation centers (SOCs). The semi-structured nature of host logs inhibits automated analytics, and while manual analysis is common, the sheer volume makes manual inspection of all logs impossible. Although many powerful algorithms for analyzing time-series and sequential data exist, util… ▽ More

    Submitted 1 November, 2018; originally announced November 2018.