Search Results for author: Hyrum S. Anderson

Found 8 papers, 5 papers with code

Classifying Sequences of Extreme Length with Constant Memory Applied to Malware Detection

1 code implementation17 Dec 2020 Edward Raff, William Fleshman, Richard Zak, Hyrum S. Anderson, Bobby Filar, Mark McLean

Recent works within machine learning have been tackling inputs of ever-increasing size, with cybersecurity presenting sequence classification problems of particularly extreme lengths.

Malware Detection Time Series +1

EMBER: An Open Dataset for Training Static PE Malware Machine Learning Models

11 code implementations12 Apr 2018 Hyrum S. Anderson, Phil Roth

This paper describes EMBER: a labeled benchmark dataset for training machine learning models to statically detect malicious Windows portable executable files.

Cryptography and Security

Learning to Evade Static PE Machine Learning Malware Models via Reinforcement Learning

4 code implementations arXiv 2018 Hyrum S. Anderson, Anant Kharkar, Bobby Filar, David Evans, Phil Roth

We show in experiments that our method can attack a gradient-boosted machine learning model with evasion rates that are substantial and appear to be strongly dependent on the dataset.

Cryptography and Security

Predicting Domain Generation Algorithms with Long Short-Term Memory Networks

3 code implementations2 Nov 2016 Jonathan Woodbridge, Hyrum S. Anderson, Anjum Ahuja, Daniel Grant

Another technique to stop malware from using DGAs is to intercept DNS queries on a network and predict whether domains are DGA generated.

Binary Classification

DeepDGA: Adversarially-Tuned Domain Generation and Detection

no code implementations6 Oct 2016 Hyrum S. Anderson, Jonathan Woodbridge, Bobby Filar

We test the hypothesis of whether adversarially generated domains may be used to augment training sets in order to harden other machine learning models against yet-to-be-observed DGAs.

BIG-bench Machine Learning Decoder +1

Cannot find the paper you are looking for? You can Submit a new open access paper.