Search Results for author: Jack W. Stokes

Found 8 papers, 1 papers with code

NEURAL MALWARE CONTROL WITH DEEP REINFORCEMENT LEARNING

no code implementations ICLR 2019 Yu Wang, Jack W. Stokes, Mady Marinescu

Antimalware products are a key component in detecting malware attacks, and their engines typically execute unknown programs in a sandbox prior to running them on the native operating system.

reinforcement-learning Reinforcement Learning (RL)

AutoAttacker: A Large Language Model Guided System to Implement Automatic Cyber-attacks

no code implementations2 Mar 2024 Jiacen Xu, Jack W. Stokes, Geoff McDonald, Xuesong Bai, David Marshall, Siyue Wang, Adith Swaminathan, Zhou Li

Large language models (LLMs) have demonstrated impressive results on natural language tasks, and security researchers are beginning to employ them in both offensive and defensive systems.

Computer Security Language Modelling +1

HetTree: Heterogeneous Tree Graph Neural Network

no code implementations21 Feb 2024 Mingyu Guan, Jack W. Stokes, Qinlong Luo, Fuchen Liu, Purvanshi Mehta, Elnaz Nouri, Taesoo Kim

In this paper, we present HetTree, a novel heterogeneous tree graph neural network that models both the graph structure and heterogeneous aspects in a scalable and effective manner.

Radial Spike and Slab Bayesian Neural Networks for Sparse Data in Ransomware Attacks

no code implementations29 May 2022 Jurijs Nazarovs, Jack W. Stokes, Melissa Turcotte, Justin Carroll, Itai Grady

While traditional deep learning models have been able to achieve state-of-the-art results in a wide variety of domains, Bayesian Neural Networks, which are a class of probabilistic models, are better suited to the issues of the ransomware data.

Variational Inference

ScriptNet: Neural Static Analysis for Malicious JavaScript Detection

no code implementations1 Apr 2019 Jack W. Stokes, Rakshit Agrawal, Geoff McDonald, Matthew Hausknecht

We use the Convoluted Partitioning of Long Sequences (CPoLS) model, which processes Javascript files as byte sequences.

Robust Neural Malware Detection Models for Emulation Sequence Learning

1 code implementation28 Jun 2018 Rakshit Agrawal, Jack W. Stokes, Mady Marinescu, Karthik Selvaraj

These models target the core of the malicious operation by learning the presence and pattern of co-occurrence of malicious event actions from within these sequences.

Computer Security Malware Detection

Neural Classification of Malicious Scripts: A study with JavaScript and VBScript

no code implementations15 May 2018 Jack W. Stokes, Rakshit Agrawal, Geoff McDonald

LaMP and CPoLS yield a TPR of 69. 3% and 67. 9%, respectively, at an FPR of 1. 0% on a collection of 240, 504 VBScript files.

General Classification

Cannot find the paper you are looking for? You can Submit a new open access paper.