Главная
Study mode:
on
1
Intro
2
Security and Machine Learning
3
Running Example: Android Malware Detection • How should we compare samples? - Permissions
4
Dilemma
5
Plato's Allegory of the Cave
6
Challenge #1
7
Challenge #2
8
Intuition for Automatic Feature Engineering
9
Behavior Extraction
10
Behavior Understanding • Link behaviors to concrete features
11
Semantic Network Example
12
How Well Does This Work?
13
Auto vs. Manual: Experiment
14
Auto vs. Manual: Features
15
Auto vs. Manual: Detection Performance
16
Knowledge Evolution
17
Alternatives
18
In A Nutshell
Description:
Explore the potential of automating feature engineering for malware detection in this conference talk from USENIX Enigma 2017. Learn about FeatureSmith, a system that synthesizes knowledge from thousands of research papers to engineer features for machine learning classifiers. Discover how this approach compares to manual feature engineering in Android malware detection, achieving comparable performance to state-of-the-art detectors. Understand the challenges of feature engineering in security applications and how FeatureSmith addresses them by suggesting informative features and linking them to human-understandable concepts. Gain insights into the evolution of knowledge in malware detection and the potential alternatives to traditional approaches.

FeatureSmith- Learning to Detect Malware by Mining the Security Literature - USENIX Enigma 2017

USENIX Enigma Conference
Add to list
0:00 / 0:00