Jason Trost

@jason_trost

Interests: Network security, Digital Forensics, Machine Learning, Big Data. retweets are not endorsements.

Atlanta, GA
Vrijeme pridruživanja: ožujak 2010.

Tweetovi

Blokirali ste korisnika/cu @jason_trost

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @jason_trost

  1. proslijedio/la je Tweet
    prije 23 sata

    v0.2 of my security learning model thanks to feedback from and . It's part of what makes security so exhilarating that many conversations (e.g. strategy around designing a threat response operation) require every layer as part of the conversation.

    Poništi
  2. proslijedio/la je Tweet
    4. velj

    There is a new AI, ML, & Data Science track for USA this year. If you are doing offensive ML research, we want to see it!

    Poništi
  3. proslijedio/la je Tweet
    4. velj

    1/ Some thoughts on the way ML gets talked about in security: Most security problems are not machine learning problems. Like encryption, dual-factor authentication, taint analysis, or hand-crafted IOCs, machine learning is just one of many security tools.

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    20. sij

    Heterogeneous Information Networks and Applications to Cyber Security

    Poništi
  5. 3. velj

    3 Short Links on Popular Domain Lists for Threat Intelligence

    Poništi
  6. 3. velj

    6 Short Links on Malware Training Set Creation for Machine Learning

    Poništi
  7. 3. velj

    Collecting and Curating IOC Whitelists for Threat Intelligence and Machine Learning Research

    Poništi
  8. proslijedio/la je Tweet
    31. sij

    Facial Recognition meets malware clustering: training on family names plus some embedding tricks stolen from the FR literature plus TSNE leads to super sharp clusters, with a few cases of potential mislabeling to dig into (check out the potential FNs southeast of the origin)!

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    29. sij
    Odgovor korisnicima i sljedećem broju korisnika:

    What % of malware uses non-TLS vs TLS for C2? Based on a (super biased) sample of ~10k binaries over 10 years I estimate it’s 90/10. Would love to see someone do a broader, less biased eval to see if it is on the rise (I don’t think it is)

    Poništi
  10. proslijedio/la je Tweet
    27. sij

    . recently decommissioned their Adversary Tactics: course, and rather than let it collect dust, they offered it up to the community for free in the spirit of their commitment to transparency.

    Poništi
  11. proslijedio/la je Tweet
    28. sij

    1\ Surprisingly, you could build a very mediocre PE malware detector with a single PE feature: the PE compile timestamp. In fact, I built a little random forest detector that uses only the timestamp as its feature that gets 62% detection on previously unseen malware at a 1% FPR.

    Prikaži ovu nit
    Poništi
  12. 28. sij

    Robustness of AI Systems Against Adversarial Attacks

    Poništi
  13. proslijedio/la je Tweet

    OSINT thread inbound. I did this all on my phone from the dog park. This ones for Starting with nothing, this is the pic. Going for an explicit pin, not just the "location". Let's build some data points. First - Identifiable landmarks, front to back 1/x

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    26. sij

    1\ Let's bypass a convolutional neural network trained to recognize previously unseen bad URLs. The classifier gives a score between 0 (benign) and 1 (definitely malicious). I start by making up a phishing URL: hxxp://wellsfargo-customer-support.webhosting.pl/login

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    24. sij

    1/ Here's a thread on how to build the kind of security artifact "social network" graph popularized by and others, but customized, and on your own private security data. Consider the following graph, where the nodes are malware samples:

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    24. sij

    Debugging deep learning models can be really tricky and frustrating, especially in the security space where a lot of the time you're not sure about ground truth labels, but here's a thread with some tricks I've picked up. Add your own if you've got them! 1/

    Prikaži ovu nit
    Poništi
  17. 27. sij

    HeadPrint: Detecting Anomalous Communications through Header-based Application Fingerprinting

    Poništi
  18. proslijedio/la je Tweet
    26. sij

    The claim in the FTI forensics report on Bezos’ iPhone that, “due to end-to-end encryption employed by WhatsApp, it is virtually impossible to decrypt the contents of the downloader [.enc file]...” bugged me so much that I coded up how to do it:

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    23. sij
    Poništi
  20. proslijedio/la je Tweet
    23. sij

    presenting very thorough and original work on inferring descriptions of malware samples' purposes, via a deep neural net. . Work done jointly with , , , and AI.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·