Skip to main content

Showing 1–3 of 3 results for author: Chaulagain, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.01529  [pdf, other

    cs.CR cs.LG

    On the Abuse and Detection of Polyglot Files

    Authors: Luke Koch, Sean Oesch, Amul Chaulagain, Jared Dixon, Matthew Dixon, Mike Huettal, Amir Sadovnik, Cory Watson, Brian Weber, Jacob Hartman, Richard Patulski

    Abstract: A polyglot is a file that is valid in two or more formats. Polyglot files pose a problem for malware detection systems that route files to format-specific detectors/signatures, as well as file upload and sanitization tools. In this work we found that existing file-format and embedded-file detection tools, even those developed specifically for polyglot files, fail to reliably detect polyglot files… ▽ More

    Submitted 1 July, 2024; originally announced July 2024.

    Comments: 18 pages, 11 figures

  2. arXiv:2404.10788  [pdf, other

    cs.CR cs.AI

    The Path To Autonomous Cyber Defense

    Authors: Sean Oesch, Phillipe Austria, Amul Chaulagain, Brian Weber, Cory Watson, Matthew Dixson, Amir Sadovnik

    Abstract: Defenders are overwhelmed by the number and scale of attacks against their networks.This problem will only be exacerbated as attackers leverage artificial intelligence to automate their workflows. We propose a path to autonomous cyber agents able to augment defenders by automating critical steps in the cyber defense life cycle.

    Submitted 12 April, 2024; originally announced April 2024.

    Comments: 9 pages, 3 figures

  3. arXiv:2203.07561  [pdf, other

    cs.CR cs.LG

    Toward the Detection of Polyglot Files

    Authors: Luke Koch, Sean Oesch, Mary Adkisson, Sam Erwin, Brian Weber, Amul Chaulagain

    Abstract: Standardized file formats play a key role in the development and use of computer software. However, it is possible to abuse standardized file formats by creating a file that is valid in multiple file formats. The resulting polyglot (many languages) file can confound file format identification, allowing elements of the file to evade analysis.This is especially problematic for malware detection syst… ▽ More

    Submitted 12 April, 2022; v1 submitted 14 March, 2022; originally announced March 2022.