Skip to main content

Showing 1–5 of 5 results for author: Sicard, G

Searching in archive cs. Search in all archives.
.
  1. arXiv:2009.13243  [pdf, other

    cs.CR

    Generating End-to-End Adversarial Examples for Malware Classifiers Using Explainability

    Authors: Ishai Rosenberg, Shai Meir, Jonathan Berrebi, Ilay Gordon, Guillaume Sicard, Eli David

    Abstract: In recent years, the topic of explainable machine learning (ML) has been extensively researched. Up until now, this research focused on regular ML users use-cases such as debugging a ML model. This paper takes a different posture and show that adversaries can leverage explainable ML to bypass multi-feature types malware classifiers. Previous adversarial attacks against such classifiers only add ne… ▽ More

    Submitted 1 June, 2022; v1 submitted 28 September, 2020; originally announced September 2020.

    Comments: Accepted as a conference paper at IJCNN 2020

  2. arXiv:1912.01493  [pdf, other

    cs.CR cs.LG cs.NE stat.ML

    End-to-End Deep Neural Networks and Transfer Learning for Automatic Analysis of Nation-State Malware

    Authors: Ishai Rosenberg, Guillaume Sicard, Eli David

    Abstract: Malware allegedly developed by nation-states, also known as advanced persistent threats (APT), are becoming more common. The task of attributing an APT to a specific nation-state or classifying it to the correct APT family is challenging for several reasons. First, each nation-state has more than a single cyber unit that develops such malware, rendering traditional authorship attribution algorithm… ▽ More

    Submitted 29 November, 2019; originally announced December 2019.

    Comments: arXiv admin note: substantial text overlap with arXiv:1711.09666

    Journal ref: Entropy, Vol. 20, No. 5, pp. 390-401, May 2018

  3. DeepOrigin: End-to-End Deep Learning for Detection of New Malware Families

    Authors: Ilay Cordonsky, Ishai Rosenberg, Guillaume Sicard, Eli David

    Abstract: In this paper, we present a novel method of differentiating known from previously unseen malware families. We utilize transfer learning by learning compact file representations that are used for a new classification task between previously seen malware families and novel ones. The learned file representations are composed of static and dynamic features of malware and are invariant to small modific… ▽ More

    Submitted 23 November, 2019; v1 submitted 22 September, 2018; originally announced September 2018.

    Journal ref: International Joint Conference on Neural Networks (IJCNN), pages 1-7, Rio de Janeiro, Brazil, July 2018

  4. arXiv:1711.09666  [pdf, ps, other

    cs.CR cs.LG cs.NE stat.ML

    DeepAPT: Nation-State APT Attribution Using End-to-End Deep Neural Networks

    Authors: Ishai Rosenberg, Guillaume Sicard, Eli David

    Abstract: In recent years numerous advanced malware, aka advanced persistent threats (APT) are allegedly developed by nation-states. The task of attributing an APT to a specific nation-state is extremely challenging for several reasons. Each nation-state has usually more than a single cyber unit that develops such advanced malware, rendering traditional authorship attribution algorithms useless. Furthermore… ▽ More

    Submitted 27 November, 2017; originally announced November 2017.

    Journal ref: International Conference on Artificial Neural Networks (ICANN), Springer LNCS, Vol. 10614, pp. 91-99, Alghero, Italy, September, 2017

  5. arXiv:1009.3589  [pdf, other

    cs.LG cs.CV cs.NE

    Deep Self-Taught Learning for Handwritten Character Recognition

    Authors: Frédéric Bastien, Yoshua Bengio, Arnaud Bergeron, Nicolas Boulanger-Lewandowski, Thomas Breuel, Youssouf Chherawala, Moustapha Cisse, Myriam Côté, Dumitru Erhan, Jeremy Eustache, Xavier Glorot, Xavier Muller, Sylvain Pannetier Lebeuf, Razvan Pascanu, Salah Rifai, Francois Savard, Guillaume Sicard

    Abstract: Recent theoretical and empirical work in statistical machine learning has demonstrated the importance of learning algorithms for deep architectures, i.e., function classes obtained by composing multiple non-linear transformations. Self-taught learning (exploiting unlabeled examples or examples from other distributions) has already been applied to deep learners, but mostly to show the advantage of… ▽ More

    Submitted 18 September, 2010; originally announced September 2010.

    Report number: 1353, Dept. IRO, U. Montreal MSC Class: 68T05 ACM Class: I.2.6