no code implementations • ICLR 2019 • Yu Wang, Jack W. Stokes, Mady Marinescu
Antimalware products are a key component in detecting malware attacks, and their engines typically execute unknown programs in a sandbox prior to running them on the native operating system.
no code implementations • 19 Mar 2024 • Ying-Chun Lin, Jennifer Neville, Jack W. Stokes, Longqi Yang, Tara Safavi, Mengting Wan, Scott Counts, Siddharth Suri, Reid Andersen, Xiaofeng Xu, Deepak Gupta, Sujay Kumar Jauhar, Xia Song, Georg Buscher, Saurabh Tiwary, Brent Hecht, Jaime Teevan
Accurate and interpretable user satisfaction estimation (USE) is critical for understanding, evaluating, and continuously improving conversational systems.
no code implementations • 2 Mar 2024 • Jiacen Xu, Jack W. Stokes, Geoff McDonald, Xuesong Bai, David Marshall, Siyue Wang, Adith Swaminathan, Zhou Li
Large language models (LLMs) have demonstrated impressive results on natural language tasks, and security researchers are beginning to employ them in both offensive and defensive systems.
no code implementations • 21 Feb 2024 • Mingyu Guan, Jack W. Stokes, Qinlong Luo, Fuchen Liu, Purvanshi Mehta, Elnaz Nouri, Taesoo Kim
In this paper, we present HetTree, a novel heterogeneous tree graph neural network that models both the graph structure and heterogeneous aspects in a scalable and effective manner.
no code implementations • 29 May 2022 • Jurijs Nazarovs, Jack W. Stokes, Melissa Turcotte, Justin Carroll, Itai Grady
While traditional deep learning models have been able to achieve state-of-the-art results in a wide variety of domains, Bayesian Neural Networks, which are a class of probabilistic models, are better suited to the issues of the ransomware data.
no code implementations • 1 Apr 2019 • Jack W. Stokes, Rakshit Agrawal, Geoff McDonald, Matthew Hausknecht
We use the Convoluted Partitioning of Long Sequences (CPoLS) model, which processes Javascript files as byte sequences.
1 code implementation • 28 Jun 2018 • Rakshit Agrawal, Jack W. Stokes, Mady Marinescu, Karthik Selvaraj
These models target the core of the malicious operation by learning the presence and pattern of co-occurrence of malicious event actions from within these sequences.
no code implementations • 15 May 2018 • Jack W. Stokes, Rakshit Agrawal, Geoff McDonald
LaMP and CPoLS yield a TPR of 69. 3% and 67. 9%, respectively, at an FPR of 1. 0% on a collection of 240, 504 VBScript files.