SlideShare a Scribd company logo
1 of 81
Download to read offline
Machine
Learning
Protect against
tomorrow’s
threats
基於機器學習的惡
意軟體分類實作:	
Microsoft	Malware	
Classification	
Challenge	經驗談
Trend Micro
ch0upi
miaoski
Kyle Chung
2 Dec 2016
Machine
Learning
Protect against
tomorrow’s
threats
Machine
Learning
Protect against
tomorrow’s
threatsch0upi
• Staff	engineer	in	Trend	Micro
• Machine	Learning	+	Data	Analysis
• Threat	intelligence	services
• KDDCup 2014	+	KDDCup 2016:	Top10
• GoTrend:	6th in	UEC	Cup	2015
Machine
Learning
Protect against
tomorrow’s
threats
Machine
Learning
Protect against
tomorrow’s
threatsmiaoski
• Senior	threat	researcher	in	Trend	Micro
• Threat	intelligence
• Smart	City
• SDR
• Arduino	+	RPi makers
• Loves	cats
Machine
Learning
Protect against
tomorrow’s
threats
Machine
Learning
Protect against
tomorrow’s
threats
4
Outline
• Why	Malware	Classification?
• Machine	Learning
• Microsoft	Challenge
• How	to	Solve	it?
• Conclusion
Machine
Learning
Protect against
tomorrow’s
threats
MALWARE	
CLASSIFICATION
Machine
Learning
Protect against
tomorrow’s
threats
Machine
Learning
Protect against
tomorrow’s
threatsWhat’s	Malware	Classification?
• Identify	malware	family
Machine
Learning
Protect against
tomorrow’s
threats
Machine
Learning
Protect against
tomorrow’s
threatsWhy	Malware	Classification?
• Know	how	to	clean
• Possible	attribution
• Set	proper	priority
Machine
Learning
Protect against
tomorrow’s
threats
Machine
Learning
Protect against
tomorrow’s
threatsCurrent	Malware	Classification
• Manually	generated	by	researchers
• Use	signature	to	fingerprint	malware	
• YARA	rules
Machine
Learning
Protect against
tomorrow’s
threats
Machine
Learning
Protect against
tomorrow’s
threatsChallenge
• Manual	process	è wrong	family
• more	and	more	malware	families
• Very	large	volume
• daily	1M+	samples
• Increasing	signatures
• Slow	in	scanning	+	need	more	storage
Machine
Learning
Protect against
tomorrow’s
threats
Machine
Learning
Protect against
tomorrow’s
threatsBSidesLV 2016:	VirusShare
• John	Seymour,	Labeling	the	VirusShare Corpus:	
Lessons	Learned,	BSidesLV 2016
• VirusShare Corpus:	~20M	files
Machine
Learning
Protect against
tomorrow’s
threats
Machine
Learning
Protect against
tomorrow’s
threatsMachine	Learning	for
• Automation	of	malware	family	identification
• Save	researcher’s	effort
Machine
Learning
Protect against
tomorrow’s
threats
MACHINE LEARNING
Machine
Learning
Protect against
tomorrow’s
threats
Machine
Learning
Protect against
tomorrow’s
threats
13
Machine	Learning	Steps
• Prepare	Data
• Generate	Feature
• Train	Model
• Make	Prediction
• Evaluate
Machine
Learning
Protect against
tomorrow’s
threats
Machine
Learning
Protect against
tomorrow’s
threats
14
Fruit	Classification
• Apple
• Banana
Machine
Learning
Protect against
tomorrow’s
threats
Machine
Learning
Protect against
tomorrow’s
threats
15
Fruit	Features
• Color
• Shape
• Size
• Weight
Machine
Learning
Protect against
tomorrow’s
threats
Machine
Learning
Protect against
tomorrow’s
threats
16
Learning
• Apple
• Banana
Machine
Learning
Protect against
tomorrow’s
threats
Machine
Learning
Protect against
tomorrow’s
threats
17
Learned	Model	of	Fruit
• Apple
• Color:	Red
• Shape:	Round
• Banana
• Color:	Yellow
• Shape:	Long
Machine
Learning
Protect against
tomorrow’s
threats
Machine
Learning
Protect against
tomorrow’s
threats
18
New	Fruit	Coming…
• Apple?	Banana?
Machine
Learning
Protect against
tomorrow’s
threats
Machine
Learning
Protect against
tomorrow’s
threats
19
Prediction	of	Fruits
• Fruit	1
• Color:	Red	=>	Apple
• Shape:	Round	=>	Apple
• Fruit	2
• Color:	Yellow	=>	Banana
• Shape:	Long	=>	Banana
Machine
Learning
Protect against
tomorrow’s
threats
Machine
Learning
Protect against
tomorrow’s
threats
20
Evaluation	of	Fruit
• Accuracy:	(9+9)/20	=	90%
Apple Banana
Apple 9 1
Banana 1 9
Total 10 10
Machine
Learning
Protect against
tomorrow’s
threats
Machine
Learning
Protect against
tomorrow’s
threats
21
Machine	Learning	Steps
• Prepare	Data
• Generate	Feature
• Train	Model
• Make	Prediction
• Evaluate
Machine
Learning
Protect against
tomorrow’s
threats
Machine
Learning
Protect against
tomorrow’s
threats
22
Machine	Learning	is	...
• Mathematical	methods	and	algorithms
• From	historical	labelled	data
• Find	a	separating	hyperplane
• Apply	it	on	future	data
Machine
Learning
Protect against
tomorrow’s
threats
Machine
Learning
Protect against
tomorrow’s
threats
23
Feature	is	...
• Measurable	property	of	a	phenomenon	being	
observed
• Use	to	describe	entries
• Feature	vector
• input	of	machine	learning	algorithm
• Source	of	features
• data	exploring
• domain	knowledge
Machine
Learning
Protect against
tomorrow’s
threats
Machine
Learning
Protect against
tomorrow’s
threats
24
Model	is	...
• A	mathematical	description	of	how	to	classify	the	
data
• Parameters	tuned	by	certain	algorithm
• training
• Used	to	make	prediction
Machine
Learning
Protect against
tomorrow’s
threats
Machine
Learning
Protect against
tomorrow’s
threats
25
Prediction
• Identify	the	class	of	new	entities
• With	trained	model	from	training	data
Machine
Learning
Protect against
tomorrow’s
threats
Machine
Learning
Protect against
tomorrow’s
threats
26
Evaluation
• Review	model	result	by	some	measurements
• Cross	validation
• Evaluation	functions
• Accuracy
• logloss
• AUC
• precision,	recall,	F1
Machine
Learning
Protect against
tomorrow’s
threats
Machine
Learning
Protect against
tomorrow’s
threats
27
Glue	Language
• Glue	the	steps	of	Machine	Learning	Learning
• Batch	running	for	large	amount	of	data
• Integration	with	Hadoop,	Spark
• Rich	libraries/Algorithm	support
• Easy	to	develop/learn
Machine
Learning
Protect against
tomorrow’s
threats
Machine
Learning
Protect against
tomorrow’s
threats
28
scikit learn
• Open	source	machine	learning	library	for	python
• Various	classification,	regression	and	clustering	
algorithms
• Interoperate	with	NumPy,	SciPy,	and	underlying	
BLAS
Machine
Learning
Protect against
tomorrow’s
threats
Machine
Learning
Protect against
tomorrow’s
threats
29
scikit learn	cheat-sheet
Machine
Learning
Protect against
tomorrow’s
threats
Machine
Learning
Protect against
tomorrow’s
threats
30
Supported	Algorithm	in	scikit learn
• Classification	Algorithm
• Logistic	Regression:	linear_model.LogisticRegression()
• SVM:	svm.SVC()
• Random	Forest:	ensemble.RandomForestClassifier()
• Interface
• fit(X,	Y):	train	model
• Yp=predict(X):	make	prediction
Machine
Learning
Protect against
tomorrow’s
threats
Machine
Learning
Protect against
tomorrow’s
threats
31
Evaluation	Functions	in	scikit learn
• Evaluation	functions
• metrics.accuracy_score()
• metrics.log_loss()
• metrics.auc()
• metrics.f1_score()
• metrics.confusion_matrix()
• metrics.classification_report()
Machine
Learning
Protect against
tomorrow’s
threats
MICROSOFT	MALWARE	
CLASSIFICATION	CHALLENGE
Machine
Learning
Protect against
tomorrow’s
threats
Machine
Learning
Protect against
tomorrow’s
threats
33
Microsoft	Malware	Classification	
Challenge
• Hosted	by	WWW	2015	/	BIG	2015	
• Microsoft	Malware	Protection	Center
Microsoft	Azure	Machine	Learning
Microsoft	Talent	Management
• PE	Hexdump &	Disassembled
• Training:	10,868	(compressed:	17.5GB)
• Testing:	10,873	(compressed:	17.7GB)
Machine
Learning
Protect against
tomorrow’s
threats
Machine
Learning
Protect against
tomorrow’s
threats
34
9 Classes
Category Count
1 Ramnit 1541
2 Lollipop 2478
3 Kelihos_ver3 2942
4 Vundo 475
5 Simda 42
6 Tracur 751
7 Kelihos_ver1 398
8 Obfuscator.ACY 1228
9 Gatak 1013
Total 10868
Machine
Learning
Protect against
tomorrow’s
threats
Machine
Learning
Protect against
tomorrow’s
threats
35
Class:	Ramnit
• Steal	sensitive	personal	information
• Infected	through	removable	drivers
• Copy	itself	using	a	hard-coded	name,	or	with	a	
random	file	name	to	a	random	folder
• Inject	codes	into	svchost.exe
• Infects	DLL,	EXE,	HTML
Machine
Learning
Protect against
tomorrow’s
threats
Machine
Learning
Protect against
tomorrow’s
threats
36
Class:	Lollipop
• An	adware	shows	ads	when	browsing	web
• Bundle	with	third-party	software
• Auto	run	when	Windows	starting
Machine
Learning
Protect against
tomorrow’s
threats
Machine
Learning
Protect against
tomorrow’s
threats
37
Class:	Kelihos
• A	Trojan	family	distributes	spam	email	with	
malware	download	link
• Communicate	with	C&C	server
• Some	variants	install	WinPcap to	spy	network	
activity
Machine
Learning
Protect against
tomorrow’s
threats
Machine
Learning
Protect against
tomorrow’s
threats
38
PE	Hexdump w/o	Header
Machine
Learning
Protect against
tomorrow’s
threats
Machine
Learning
Protect against
tomorrow’s
threats
39
IDA	Pro	Dump
Machine
Learning
Protect against
tomorrow’s
threats
Machine
Learning
Protect against
tomorrow’s
threats
40
IDA	Pro	Dump
Machine
Learning
Protect against
tomorrow’s
threats
Machine
Learning
Protect against
tomorrow’s
threats
41
IDA	Pro	Dump
Machine
Learning
Protect against
tomorrow’s
threats
Machine
Learning
Protect against
tomorrow’s
threats
42
Evaluation	Function
pij is the submitted probability of sample i is class j
yij=1 if sample i is class j,
yij=0 for others
𝑙𝑜𝑔𝑙𝑜𝑠𝑠 = −
1
𝑁
) ) 𝑦𝑖𝑗	log	( 𝑝𝑖𝑗)
4
567
8
967
Machine
Learning
Protect against
tomorrow’s
threats
Machine
Learning
Protect against
tomorrow’s
threats
43
Evaluation	Example
• Submission
00000000,0.5,0.5,0,0,0,0,0,0,0,0
00000001,0,0,0.5,0.5,0,0,0,0,0,0
00000002,0,0,1,0,0,0,0,0,0,0
• logloss =	- (log(0.5)+log(0)+log(1))/3
• log(0)	=>	log(1e-15)
Machine
Learning
Protect against
tomorrow’s
threats
Machine
Learning
Protect against
tomorrow’s
threats
44
Leader	Board
• Public	vs.	Private
Machine
Learning
Protect against
tomorrow’s
threats
Machine
Learning
Protect against
tomorrow’s
threats
45
Leader	Board
Public
Private
Machine
Learning
Protect against
tomorrow’s
threats
HOW	TO	SOLVE	IT?
Machine
Learning
Protect against
tomorrow’s
threats
Machine
Learning
Protect against
tomorrow’s
threats
47
First	Feature	Set
• Binary	size
• Hex	count
• String	length	stats
• TLSH
Machine
Learning
Protect against
tomorrow’s
threats
Machine
Learning
Protect against
tomorrow’s
threats
48
Binary	Size
Category Avg. Size
1 Ramnit 1482170
2 Lollipop 5829530
3 Kelihos_ver3 8982630
4 Vundo 1120950
5 Simda 4552330
6 Tracur 1801150
7 Kelihos_ver1 5051900
8 Obfuscator.ACY 827118
9 Gatak 2555070
0
1000000
2000000
3000000
4000000
5000000
6000000
7000000
8000000
9000000
10000000
1 2 3 4 5 6 7 8 9
Machine
Learning
Protect against
tomorrow’s
threats
Machine
Learning
Protect against
tomorrow’s
threats
49
Hex	Count
• Count	of	HEX
• 00,	01,	02,…,	FE,	FF,	??
• 257	dimensions
• 1-gram
Machine
Learning
Protect against
tomorrow’s
threats
Machine
Learning
Protect against
tomorrow’s
threats
50
Hex	Count	Distribution
0009121b242d36 3f 48515a636c757e879099a2abb4bdc6 cf d8e1ea f3 fc
0009121b242d36 3f 48515a636c757e879099a2abb4bdc6 cf d8e1ea f3 fc
0009121b242d36 3f 48515a636c757e879099a2abb4bdc6 cf d8e1ea f3 fc
1. Ramnit
2. Lollipop
3. Kelihos_v3
Machine
Learning
Protect against
tomorrow’s
threats
Machine
Learning
Protect against
tomorrow’s
threats
51
Hex	Count	Confusion	Matrix?
Machine
Learning
Protect against
tomorrow’s
threats
Machine
Learning
Protect against
tomorrow’s
threats
52
String	Stats
• String:	printable	chars	where	length	>	4
• String	count,	avg.	length,	max	length
0
2000
4000
6000
8000
10000
12000
14000
1 2 3 4 5 6 7 8 9
0
2
4
6
8
10
12
14
16
18
20
1 2 3 4 5 6 7 8 9
Avg. Count
Avg. length
Machine
Learning
Protect against
tomorrow’s
threats
Machine
Learning
Protect against
tomorrow’s
threats
53
TLSH
• Trend	Micro	Locality	Sensitive	Hash
• Fuzzy	matching	for	similarity	comparison
• Get	the	most	similar	class	by	voting	of	Top5	similar	
files	from	training	data
Machine
Learning
Protect against
tomorrow’s
threats
Machine
Learning
Protect against
tomorrow’s
threats
54
TLSH
0
500
1000
1500
2000
2500
3000
3500
1 2 3 4 5 6 7 8 9
Machine
Learning
Protect against
tomorrow’s
threats
Machine
Learning
Protect against
tomorrow’s
threats
55
More	Features
• HEX	n-gram
• API	call
• Import	table
• Instruction
• Domain	knowledge
Machine
Learning
Protect against
tomorrow’s
threats
Machine
Learning
Protect against
tomorrow’s
threats
56
2-gram/3-gram
• 2-gram:	(256+1)^2=	66,049
• 3-gram:	(256+1)^3=	16,974,593
Machine
Learning
Protect against
tomorrow’s
threats
Machine
Learning
Protect against
tomorrow’s
threats
57
HEX	2-gram/3-gram
• Important	2-gram	Example
• Feature	selection:	reduce	feature	size
BiHEX 1. Ramnit 2. Lollipop 3. Kelihos_ver3
97 86 1.412 2.047 26.651
4b e5 1.718 0.722 13.201
f7 99 1.746 12.539 13.606
75 08 228.09 288.78 13.168
4e 47 146.318 12.159 13.512
Machine
Learning
Protect against
tomorrow’s
threats
Machine
Learning
Protect against
tomorrow’s
threats
58
API	Call
• API	used	in	PE
API 1. Ramnit 2. Lollipop 3. Kelihos_ver3
IsWindow() 0.164 0.257 0.987
DispatchMessageA() 0.159 0.845 0.987
GetCommandLineA() 0.355 0.981 0.025
DllEntryPoint() 0.656 0 0
GetIconInfo() 0.023 0 0.936
Machine
Learning
Protect against
tomorrow’s
threats
Machine
Learning
Protect against
tomorrow’s
threats
59
Import	Table
• A	lookup	table	for	calling	functions	in	other	module
1. Ramnit 2. Lollipop 3. Kelihos_ver3
KERNEL32.dll KERNEL32.dll USER32.dll
USER32.dll USER32.dll KERNEL32.dll
ADVAPI32.dll ADVAPI32.dll MSASN1.dll
ole32.dll OPENGL32.dll UXTHEME.dll
OLEAUT32.dll OLEAUT32.dll CLBCATQ.dll
msvcrt.dll GDI32.dll DPNET.dll
APPHELP.dll WS2_32.dll NTSHRUI.dll
Machine
Learning
Protect against
tomorrow’s
threats
Machine
Learning
Protect against
tomorrow’s
threats
60
Other	Info	in	Import	Table
• Number	of	distinct	DLL
0
1
2
3
4
5
6
7
8
9
1 2 3 4 5 6 7 8 9
Machine
Learning
Protect against
tomorrow’s
threats
Machine
Learning
Protect against
tomorrow’s
threats
61
Instruction	Frequency
• Very	powerful
instruction 1. Ramnit 2. Lollipop 3. Kelihos_ver3
imul 86.768 2257.3 0.002
movzx 289.17 118.79 0
sbb 68.815 17.375 4.746
jnz 1154.8 154.57 7.842
mov 12336.6 7059.8 158.94
Machine
Learning
Protect against
tomorrow’s
threats
Machine
Learning
Protect against
tomorrow’s
threats
62
More	Domain	Knowledge
• Segment
• Packer
• Other	type	of	binary
Machine
Learning
Protect against
tomorrow’s
threats
Machine
Learning
Protect against
tomorrow’s
threats
63
Segments
• Common	segment	name
• Unique	segment	name
1. Ramnit 2. Lollipop 3. Kelihos_ver3
_data _text _rdata
_text _data _text
_rdata _rdata _data
_bss _zenc
_gnu_deb
_tls
Machine
Learning
Protect against
tomorrow’s
threats
Machine
Learning
Protect against
tomorrow’s
threats
64
Other	Info	from	Segments
• Number	of	Segments
Machine
Learning
Protect against
tomorrow’s
threats
Machine
Learning
Protect against
tomorrow’s
threats
65
Packer
• Common	segment	name	of	Packer
• UPX0/UPX1	only	in	class	8.	Obfuscator.ACY
Machine
Learning
Protect against
tomorrow’s
threats
Machine
Learning
Protect against
tomorrow’s
threats
66
Other	Type	of	Binary
• RAR	files
Machine
Learning
Protect against
tomorrow’s
threats
Machine
Learning
Protect against
tomorrow’s
threats
67
Other	Type	of	Binary
• Microsoft	Office	files
Machine
Learning
Protect against
tomorrow’s
threats
Machine
Learning
Protect against
tomorrow’s
threats
68
Ensemble:	Linear	Blending
• Combine	the	result	from	several	models
• Vote	of	models
Machine
Learning
Protect against
tomorrow’s
threats
WORK	OF	WINNING	TEAM
Machine
Learning
Protect against
tomorrow’s
threats
Machine
Learning
Protect against
tomorrow’s
threats
70
Features
• Instruction	n-gram
• ASM	pixel	map
http://blog.kaggle.com/2015/05/26/microsoft-malware-winners-interview-1st-place-no-to-overfitting/
Machine
Learning
Protect against
tomorrow’s
threats
Machine
Learning
Protect against
tomorrow’s
threats
71
Features
• ASM	pixel	map	(intensity	of	first	1000	bytes)
Machine
Learning
Protect against
tomorrow’s
threats
Machine
Learning
Protect against
tomorrow’s
threats
72
xgboost
• Gradient	boosting	package
• Widely	used	in	Kaggle	competition
Machine
Learning
Protect against
tomorrow’s
threats
CONCLUSION
Machine
Learning
Protect against
tomorrow’s
threats
Machine
Learning
Protect against
tomorrow’s
threats
74
Physical	Meaning	of	Features
• Hex	n-gram
• Opcode + imm/addr
• Instruction	n-gram
• Opcode
Machine
Learning
Protect against
tomorrow’s
threats
Machine
Learning
Protect against
tomorrow’s
threats
75
Happy	Ending?
• Welcome	to	the	real	world!
• New	malware	family
• Mis-labelling
• Mechanism	to	mitigate	the	issues.
Machine
Learning
Protect against
tomorrow’s
threats
Machine
Learning
Protect against
tomorrow’s
threats
76
Trend	Micro	XGen
Machine
Learning
Protect against
tomorrow’s
threats
Machine
Learning
Protect against
tomorrow’s
threats
77
Trend	Micro	ML	Contest
• Malware	Identification	Challenge
• 134	teams,	626	players,	from	6+	countries
• Real-time	scoring
Machine
Learning
Protect against
tomorrow’s
threats
Machine
Learning
Protect against
tomorrow’s
threats
78
How	to	Improve	Model
• Use	domain	knowledge
• Unpack, unzip ...
• Improve	feature	representation
• Distinctive features for classes which you don’t do
well
• Regulate	overfitting
Machine
Learning
Protect against
tomorrow’s
threats
Machine
Learning
Protect against
tomorrow’s
threats
79
How	to	Improve	Model
• Find	which	items	cannot	be	covered	by	model
• Adjust	current	features
• Find	new	features
• Tuning	algorithm	parameters
• Use	different	algorithm
• Ensemble/Blending
Machine
Learning
Protect against
tomorrow’s
threats
Machine
Learning
Protect against
tomorrow’s
threats
80
Local	Library	vs.	Cloud	Platform
Cloud	platform	is	not	necessarily	easier
• Glue	&	Integration
• Data	(pre-)processing
• Model	training	/	prediction
• Evaluation
• Diversity	of	ML	algorithms
• Parameter	tuning
Machine
Learning
Protect against
tomorrow’s
threats
THANK	YOU

More Related Content

Similar to 基於機器學習的惡意軟體分類實作:Microsoft Malware Classification Challenge 經驗談

icon-aiincs-obusolini201809131800-190310184140.pptx
icon-aiincs-obusolini201809131800-190310184140.pptxicon-aiincs-obusolini201809131800-190310184140.pptx
icon-aiincs-obusolini201809131800-190310184140.pptx
yugandharadahiphale2
 
icon-aiincs-obusolini201809131800-190310184140.pptx
icon-aiincs-obusolini201809131800-190310184140.pptxicon-aiincs-obusolini201809131800-190310184140.pptx
icon-aiincs-obusolini201809131800-190310184140.pptx
yugandharadahiphale2
 
Jd sherry howard a. schmidt cyber crime, cyberspy, cyberwar - taking the le...
Jd sherry howard a. schmidt   cyber crime, cyberspy, cyberwar - taking the le...Jd sherry howard a. schmidt   cyber crime, cyberspy, cyberwar - taking the le...
Jd sherry howard a. schmidt cyber crime, cyberspy, cyberwar - taking the le...
Graeme Wood
 

Similar to 基於機器學習的惡意軟體分類實作:Microsoft Malware Classification Challenge 經驗談 (20)

Crowdsourcing Cyber Security
Crowdsourcing Cyber SecurityCrowdsourcing Cyber Security
Crowdsourcing Cyber Security
 
cv-2016-23
cv-2016-23cv-2016-23
cv-2016-23
 
AI Security : Machine Learning, Deep Learning and Computer Vision Security
AI Security : Machine Learning, Deep Learning and Computer Vision SecurityAI Security : Machine Learning, Deep Learning and Computer Vision Security
AI Security : Machine Learning, Deep Learning and Computer Vision Security
 
Labeling the virus share malware dataset lessons learned
Labeling the virus share malware dataset  lessons learnedLabeling the virus share malware dataset  lessons learned
Labeling the virus share malware dataset lessons learned
 
Open power meetup at h2o 20180325 v3
Open power meetup at h2o 20180325 v3Open power meetup at h2o 20180325 v3
Open power meetup at h2o 20180325 v3
 
Software Analytics: Towards Software Mining that Matters (2014)
Software Analytics:Towards Software Mining that Matters (2014)Software Analytics:Towards Software Mining that Matters (2014)
Software Analytics: Towards Software Mining that Matters (2014)
 
Artificial Intelligence and Cybersecurity
Artificial Intelligence and CybersecurityArtificial Intelligence and Cybersecurity
Artificial Intelligence and Cybersecurity
 
Adversarial machine learning for av software
Adversarial machine learning for av softwareAdversarial machine learning for av software
Adversarial machine learning for av software
 
Artificial Intelligence in testing - A STeP-IN Evening Talk Session Speech by...
Artificial Intelligence in testing - A STeP-IN Evening Talk Session Speech by...Artificial Intelligence in testing - A STeP-IN Evening Talk Session Speech by...
Artificial Intelligence in testing - A STeP-IN Evening Talk Session Speech by...
 
Infiltrate 2015 - Data Driven Offense
Infiltrate 2015 - Data Driven Offense Infiltrate 2015 - Data Driven Offense
Infiltrate 2015 - Data Driven Offense
 
Ml master class northeastern university
Ml master class   northeastern universityMl master class   northeastern university
Ml master class northeastern university
 
The artificial reality of cyber defense
The artificial reality of cyber defenseThe artificial reality of cyber defense
The artificial reality of cyber defense
 
Enhance Security Domain with Machine Learning
Enhance Security Domain with Machine LearningEnhance Security Domain with Machine Learning
Enhance Security Domain with Machine Learning
 
BSidesLV 2013 - Using Machine Learning to Support Information Security
BSidesLV 2013 - Using Machine Learning to Support Information SecurityBSidesLV 2013 - Using Machine Learning to Support Information Security
BSidesLV 2013 - Using Machine Learning to Support Information Security
 
Ml master class
Ml master classMl master class
Ml master class
 
icon-aiincs-obusolini201809131800-190310184140.pptx
icon-aiincs-obusolini201809131800-190310184140.pptxicon-aiincs-obusolini201809131800-190310184140.pptx
icon-aiincs-obusolini201809131800-190310184140.pptx
 
icon-aiincs-obusolini201809131800-190310184140.pptx
icon-aiincs-obusolini201809131800-190310184140.pptxicon-aiincs-obusolini201809131800-190310184140.pptx
icon-aiincs-obusolini201809131800-190310184140.pptx
 
Tackle Unknown Threats with Symantec Endpoint Protection 14 Machine Learning
Tackle Unknown Threats with Symantec Endpoint Protection 14 Machine LearningTackle Unknown Threats with Symantec Endpoint Protection 14 Machine Learning
Tackle Unknown Threats with Symantec Endpoint Protection 14 Machine Learning
 
Jd sherry howard a. schmidt cyber crime, cyberspy, cyberwar - taking the le...
Jd sherry howard a. schmidt   cyber crime, cyberspy, cyberwar - taking the le...Jd sherry howard a. schmidt   cyber crime, cyberspy, cyberwar - taking the le...
Jd sherry howard a. schmidt cyber crime, cyberspy, cyberwar - taking the le...
 
Synthetic data in finance
Synthetic data in financeSynthetic data in finance
Synthetic data in finance
 

Recently uploaded

%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
masabamasaba
 
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Medical / Health Care (+971588192166) Mifepristone and Misoprostol tablets 200mg
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
shinachiaurasa2
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
masabamasaba
 
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Medical / Health Care (+971588192166) Mifepristone and Misoprostol tablets 200mg
 
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
masabamasaba
 

Recently uploaded (20)

%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
 
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
 
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
Artyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptxArtyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptx
 
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
 
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
What Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the SituationWhat Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the Situation
 
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
 
8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students
 
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
 
Architecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastArchitecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the past
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
%in Benoni+277-882-255-28 abortion pills for sale in Benoni
%in Benoni+277-882-255-28 abortion pills for sale in Benoni%in Benoni+277-882-255-28 abortion pills for sale in Benoni
%in Benoni+277-882-255-28 abortion pills for sale in Benoni
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 

基於機器學習的惡意軟體分類實作:Microsoft Malware Classification Challenge 經驗談