Search Results for author: Mohammad Saidur Rahman

Found 7 papers, 3 papers with code

Transformers for End-to-End InfoSec Tasks: A Feasibility Study

no code implementations5 Dec 2022 Ethan M. Rudd, Mohammad Saidur Rahman, Philip Tully

We implement transformer models for two distinct InfoSec data formats - specifically URLs and PE files - in a novel end-to-end approach, and explore a variety of architectural designs, training regimes, and experimental settings to determine the ingredients necessary for performant detection models.

Binary Classification Malware Detection

On the Limitations of Continual Learning for Malware Classification

1 code implementation13 Aug 2022 Mohammad Saidur Rahman, Scott E. Coull, Matthew Wright

To our surprise, continual learning methods significantly underperformed naive Joint replay of the training data in nearly all settings -- in some cases reducing accuracy by more than 70 percentage points.

Continual Learning General Classification +2

Tik-Tok: The Utility of Packet Timing in Website Fingerprinting Attacks

1 code implementation18 Feb 2019 Mohammad Saidur Rahman, Payap Sirinam, Nate Mathews, Kantha Girish Gangadhara, Matthew Wright

To further investigate the value of timing information, we perform an information leakage analysis on our proposed handcrafted features.

Website Fingerprinting Attacks Cryptography and Security

Mockingbird: Defending Against Deep-Learning-Based Website Fingerprinting Attacks with Adversarial Traces

1 code implementation18 Feb 2019 Mohsen Imani, Mohammad Saidur Rahman, Nate Mathews, Matthew Wright

Since the attacker gets to design his classifier based on the defense design, we first demonstrate that at least one technique for generating adversarial-example based traces fails to protect against an attacker using adversarial training for robust classification.

Website Fingerprinting Defense Cryptography and Security

Cannot find the paper you are looking for? You can Submit a new open access paper.