Advertisement · 728 × 90

Posts by Marcus Botacin

CSCE 704: Data Analytics for Cybersecurity I will teach my cybersecurity course under the data science umbrella this Fall. Please, enroll into CSCE 704-602. My approach will be similar to what I did in previous semesters. Take a look here

Another edition of my security course finished. We moved to the Data Analytics for CyberSec (marcusbotacin.github.io/teaching/dat...) (prev. ML-Based cyberdefense: marcusbotacin.github.io/teaching/ml-1), but the spirit of the course remains the same. Click to check what we achieved this semester!

4 months ago 0 0 0 0
Hardware is the New Software - Marcus Botacin
Hardware is the New Software - Marcus Botacin YouTube video by CYBRSECMedia

The video for my talk "Hardware is the New Software: The Next-Gen AntiViruses and how your hardware will self-secure your system!" is available at: www.youtube.com/watch?v=P3p-...

5 months ago 0 0 0 0

The recording of the talk is available at: www.youtube.com/watch?v=0Nke...

5 months ago 1 1 0 0
Post image

Wed. Oct. 29th, 4:30pm ET: "Malware Detection under Concept Drift: Science and Engineering" - Marcus Botacin - Texas A&M ceri.as/marcus

5 months ago 1 1 0 1
Hardware is the New Software: The Next-Gen AntiViruses and how your hardware will self-secure your system! My talk about hardware AVs. Slides

My most recent talk at @HouSecCon "Hardware is the New Software: The Next-Gen AntiViruses and how your hardware will self-secure your system!" See the slides at marcusbotacin.github.io/talks/housec25

6 months ago 0 0 0 0
Making Acoustic Side-Channel Attacks on Noisy Keyboards Viable with LLM-Assisted Spectrograms' "Typo" Correction | USENIX

[New Paper] "Making Acoustic Side-Channel Attacks on Noisy Keyboards Viable with LLM-Assisted Spectrograms Typo Correction" usenix.org/conference/w... We published this week at @wootsecurity.bsky.social

8 months ago 0 0 0 0

And I will be talking there!

9 months ago 0 0 0 0
Advertisement

Want to know more? Check our work!

9 months ago 0 0 0 0
Post image

And there are pretty significant cases of dataset imbalances in popular malware dataset, such as in DREBIN. See the results for more than 5K runs with different configurations:

9 months ago 0 0 1 0
Post image

This includes false positives (on the drift detection report). We are able to pinpoint, for instance, when a FP occurs because the model did not learn enough due to class imbalance.

9 months ago 0 0 1 0
Post image

The result is that this approach can explain what is happening at every drift point.

9 months ago 0 0 1 0
Post image

We created an entire taxonomy about when drift happens and when not, for the most formal ones.

9 months ago 0 0 1 0
Post image

We also identified that concept drift is directional, i.e., only expansions towards the border cause true drift in the main classifier. Therefore, by measuring directionality we can predict if a concept expansion will cause a drift in the future and even anticipate to it (early retrain).

9 months ago 0 0 1 0
Post image

We detect these cases via an architecture of external meta-models to be applied to any internal ML model. They measure the concepts and the main model measures the boundaries. True drift represent changes in both meta models and boundaries, and false ones affect only the boundary.

9 months ago 0 0 1 0
Post image

Our insight is that there is a difference between the concept (circles) and the decision boundary (lines) of a classifier. Sometimes samples cross the boundary because concept expansion (true drift), but sometimes because the line is misplaced (false positive drift). We want to detect these cases.

9 months ago 0 0 1 0
Towards Explainable Drift Detection and Early Retrain in ML-Based Malware Detection Pipelines My student paper about explaining concept drift events and anticipating retraining points in malware detection pipelines.

[New Paper] "Towards Explainable Drift Detection and Early Retrain in ML-Based Malware Detection Pipelines" - My first paper having a student as main author. Congrats to Jayesh for his presentation today at DIMVA! Check the paper here: marcusbotacin.github.io/publication/...

9 months ago 0 0 1 0

See you in the next offering!

11 months ago 0 0 0 0
Advertisement

All the vulnerabilities were disclosed to the developers. Many of them (unfortunately not all) answered and even fixed them, which is great!

11 months ago 0 0 1 0
[SW Security] Random Number Generators: Demo
[SW Security] Random Number Generators: Demo YouTube video by mfbotacin

I recorded some of the classes, if you are interested: www.youtube.com/watch?v=E8qV...

11 months ago 0 0 1 0
Post image

But don't worry. The students were able to patch many of those vulnerabilities and to verify many other patches, such as those escapes:

11 months ago 0 0 1 0
Post image

In a more sophisticated attack, one team was able to abuse an intent to move the window to the foreground while screenshoting it via accessibility services.

11 months ago 0 0 1 0
Post image

The previous attack was ran against a mobile app. What happen when the app is protected by a password? Well, students could bruteforce it.

11 months ago 0 0 1 0
Post image

In the worst case, one could remotely trigger user deletion by manipulation the client-side requests.

11 months ago 0 0 1 0
Post image

So why not setting it to the maximum value possible?

11 months ago 0 0 1 0
Post image

Another classical attack: MITM. One team identified an application (game) whose credits were set at the user side and not validated.

11 months ago 0 0 1 0
Advertisement
Post image

OK, sometimes the students exaggerate on how much payload they add to the requests...

11 months ago 0 0 1 0
Post image

Or to steal cookies. That moment when your students come to you with a panel of stolen session cookies...

11 months ago 0 0 1 0
Post image

In a more ellaborated attack, one could use XSS to turn an input form into a complete keylogger.

11 months ago 0 0 1 0
Post image

More than one team found XSS cases, in diverse websites.

11 months ago 0 0 1 0
Post image

Another classical problem identified by the teams were XSS, that can be still widely found online.

11 months ago 0 0 1 0