{"583349":{"#nid":"583349","#data":{"type":"news","title":"Georgia Tech Launches New Research on the Security of Machine-Learning Systems","body":[{"value":"\u003Cdiv\u003E\r\n\u003Cdiv\u003E\r\n\u003Cp\u003EA $1.5 million gift from Intel Corporation has established a new research center at the Georgia Institute of Technology dedicated to the emerging field of machine-learning (ML) cybersecurity with a focus on strengthening the analytics behind malware detection and threat analysis.\u003C\/p\u003E\r\n\r\n\u003Cp\u003EAs the \u003Cstrong\u003EIntel Science \u0026amp; Technology Center for Adversary-Resilient Security Analytics \u003C\/strong\u003E(ISTC-ARSA) housed at Georgia Tech\u0026rsquo;s \u003Ca href=\u0022http:\/\/www.iisp.gatech.edu\/\u0022\u003EInstitute for Information Security \u0026amp; Privacy\u003C\/a\u003E (IISP), researchers will study the vulnerabilities of ML algorithms and develop new security approaches to improve the resilience of ML applications including security analytics, search engines, customized news feeds, facial and voice recognition, fraud detection, and more. Work at the ISTC-ARSA will compliment additional ML research conducted by the \u003Ca href=\u0022http:\/\/www.ml.gatech.edu\/\u0022 target=\u0022_blank\u0022\u003EMachine Learning at Georgia Tech\u003C\/a\u003E (ML@GT) research center, \u003Ca href=\u0022http:\/\/www.cc.gatech.edu\/news\/582203\/two-new-interdisciplinary-research-centers-shaping-future-computing\u0022 target=\u0022_blank\u0022\u003Eestablished in July\u003C\/a\u003E in the College of Computing.\u003C\/p\u003E\r\n\r\n\u003Cp\u003EAlready, attackers can launch a causative (or, data poisoning) attack, which injects intentionally misleading or false training data so that an ML model becomes ineffective. Intuitively, if the ML algorithm uses the wrong examples, it is going to learn the wrong model. Attackers can also launch an exploratory (or, evasion) attack to find the blind spots of a ML model and evade detection. For example, if an attacker discovers that a detection model looks for unusually high traffic, he can send malicious traffic at a lower volume and just take more time to complete his attack. Researchers at the ISTC-ARSA will systematically evaluate the security and robustness of ML systems in the face of causative and exploratory attacks and develop new algorithms and systems to improve resilience.\u003C\/p\u003E\r\n\u003C\/div\u003E\r\n\u003C\/div\u003E\r\n\r\n\u003Cdiv\u003E\r\n\u003Cdiv\u003E\r\n\u003Cp\u003E\u0026ldquo;These issues in an adversarial setting pose many interesting and new machine learning challenges,\u0026rdquo; says \u003Ca href=\u0022http:\/\/www.iisp.gatech.edu\/wenke-lee\u0022\u003E\u003Cstrong\u003EWenke Lee\u003C\/strong\u003E\u003C\/a\u003E, the principle investigator leading the ISTC-ARSA, a co-director of the IISP, and the John P. Imlay Jr. chair in software at Georgia Tech\u0026rsquo;s School of Computer Science. \u0026ldquo;For example, for the defender, it is important to understand the trade-offs between how long to keep a machine-learning model fixed, which can give rise to exploratory attacks, versus how frequently to update it, which opens the window for causative attacks. This grant from Intel will enable us to explore these issues and develop new approaches to better address these vulnerabilities.\u0026rdquo;\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026ldquo;Intel Labs has long been a significant investor in university research. With this investment in the Georgia Institute of Technology, we continue to support academic research in one of the most challenging areas of security, namely the deterrence of adversarial attacks on today\u0026rsquo;s machine learning infrastructure,\u0026rdquo; said Sridhar Iyengar, vice president and Director of Security and Privacy Research of Intel Labs.\u003C\/p\u003E\r\n\r\n\u003Cp\u003EIn order to determine how adversaries can attack machine-learning security analytics, researchers and students at the ISTC-ARSA have begun to develop \u0026ldquo;MLsploit\u0026rdquo; \u0026ndash; an evaluation and fortification framework that incorporates Intel\u0026reg; Software Guard Extensions (Intel\u0026reg; SGX). The MLsploit tool will:\u003C\/p\u003E\r\n\r\n\u003Cul\u003E\r\n\t\u003Cli\u003EAutomate exploratory attacks by transforming a given piece of malware to behave like legitimate software in order to evade detection;\u003C\/li\u003E\r\n\t\u003Cli\u003EInject noise into malware behavior so that the malicious data from the malware becomes polluted;\u003C\/li\u003E\r\n\t\u003Cli\u003EApply \u0026ldquo;feature deletion\u0026rdquo; framework to emerging machine-learning algorithms to make them more resilient to future attacks, and\u003C\/li\u003E\r\n\t\u003Cli\u003EDevelop an online ensemble framework as a major countermeasure.\u003C\/li\u003E\r\n\u003C\/ul\u003E\r\n\r\n\u003Cp\u003EIntel SGX, an Intel technology for application developers who seek to protect select code and data from disclosure or modification, will be used to hide part of the machine learning process from adversaries.\u003C\/p\u003E\r\n\r\n\u003Cp\u003EThe ISTC-ARSA team has an extensive background in machine learning, systems and network security, botnet and intrusion detection, and malware analysis. In addition to Lee are assistant professors \u003Cstrong\u003EPolo Chau\u003C\/strong\u003E and \u003Cstrong\u003ELe Song\u003C\/strong\u003E from the School of Computational Science \u0026amp; Engineering at Georgia Tech, and \u003Cstrong\u003ETaesoo Kim\u003C\/strong\u003E from the School of Computer Science. Assisting them will be three graduate security-track students and three machine learning-track students. Research results from ISTC-ARSA will be shared are part of course materials for teaching students both security and big data analytics in an integrated fashion.\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\r\n\r\n\u003Ch6\u003E\u003Cstrong\u003EAbout the researchers\u003C\/strong\u003E\u003C\/h6\u003E\r\n\r\n\u003Cp\u003E\u003Cstrong\u003E\u003Ca href=\u0022http:\/\/www.iisp.gatech.edu\/wenke-lee\u0022\u003EWenke Lee\u003C\/a\u003E\u003C\/strong\u003E is the John P. Imlay Jr. chair of software in the College of Computing and co-director of the Institute for Information Security \u0026amp; Privacy (IISP), at the Georgia Institute of Technology. Lee\u0026rsquo;s research interests are systems and network security, applied cryptography, and data mining. Lee has researched extensively in intrusion and botnet detection and malware analysis, and has pioneered research in applying machine-learning techniques to security analysis problems as well as conducted research in adversarial machine learning.\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cstrong\u003E\u003Ca href=\u0022http:\/\/www.cc.gatech.edu\/experts\/polo-chau\u0022 target=\u0022_blank\u0022\u003EPolo Chau\u003C\/a\u003E\u003C\/strong\u003E, assistant professor, received his Ph.D. in Machine Learning from Carnegie Mellon University in 2012. His research interests are machine learning, security analytics including malware analysis, and human-computer interaction. Dr. Chau will lead the development of countermeasures, in particular, the ensemble framework.\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cstrong\u003E\u003Ca href=\u0022http:\/\/www.cc.gatech.edu\/experts\/taesoo-kim\u0022 target=\u0022_blank\u0022\u003ETaesoo Kim\u003C\/a\u003E\u003C\/strong\u003E, assistant professor, received his Ph.D. in Computer Science from Massachusetts Institute of Technology in 2014. Kim\u0026rsquo;s research interests are systems security, malware analysis, and security analytics. He will lead the development of the MLsploit toolkit and also will incorporate results from this project into other curriculum development efforts funded by Intel and the National Science Foundation.\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cstrong\u003E\u003Ca href=\u0022http:\/\/www.cc.gatech.edu\/%7Elsong\/\u0022 target=\u0022_blank\u0022\u003ELe Song\u003C\/a\u003E\u003C\/strong\u003E, assistant professor, received his Ph.D. in Computer Science from the University of Sydney in 2008. His research interests are machine learning and its applications. Dr. Song will lead the theoretical studies of machine learning vulnerabilities and adversaries\u0026rsquo; capabilities, as well as algorithmic improvements to machine learning.\u0026nbsp;\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cem\u003EThe research is supported by Intel Corp. through a grant to the Georgia Tech Foundation. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the sponsoring agency.\u003C\/em\u003E\u003Cem\u003E \u003C\/em\u003E\u003Cem\u003EIntel is a registered trademark of Intel Corporation in the United States and other countries.\u003C\/em\u003E\u003C\/p\u003E\r\n\u003C\/div\u003E\r\n\u003C\/div\u003E\r\n\r\n\u003Cdiv\u003E\r\n\u003Cdiv\u003E\r\n\u003Ch6\u003E\u003Cstrong\u003EAbout the IISP\u003C\/strong\u003E\u003C\/h6\u003E\r\n\r\n\u003Cp\u003EThe \u003Ca href=\u0022http:\/\/www.iisp.gatech.edu\/\u0022\u003EInstitute for Information Security \u0026amp; Privacy\u003C\/a\u003E (IISP) at the Georgia Institute of Technology connects government, industry, and academia to solve the grand challenges of cybersecurity. As a coordinating body for multiple information security labs dedicated to academic and solution-oriented applied research, the IISP leverages intellectual capital from across Georgia Tech and its external partners to address vital solutions for national security, economic continuity, and individual safety. The IISP provides a gateway to faculty, students, and scientists and a central location for national and international collaboration. \u003Ca href=\u0022http:\/\/www.iisp.gatech.edu\u0022\u003Ewww.iisp.gatech.edu\u003C\/a\u003E\u003C\/p\u003E\r\n\u003C\/div\u003E\r\n\u003C\/div\u003E\r\n","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003EAs the\u003Cstrong\u003E Intel Science \u0026amp; Technology Center for Adversary-Resilient Security Analytics \u003C\/strong\u003E(ISTC-ARSA) housed at Georgia Tech\u0026rsquo;s \u003Ca href=\u0022http:\/\/www.iisp.gatech.edu\/\u0022\u003EInstitute for Information Security \u0026amp; Privacy\u003C\/a\u003E (IISP), researchers will study the vulnerabilities of ML algorithms and develop new security approaches to improve the resilience of ML applications including security analytics, search engines, customized news feeds, facial and voice recognition, fraud detection, and more.\u003C\/p\u003E\r\n","format":"limited_html"}],"field_summary_sentence":[{"value":"A $1.5 million gift from Intel establishes a new research center dedicated to machine-learning cybersecurity -- the analytics behind malware detection and threat analysis."}],"uid":"27490","created_gmt":"2016-10-31 19:34:27","changed_gmt":"2016-11-01 19:38:44","author":"Tara La Bouff","boilerplate_text":"","field_publication":"","field_article_url":"","dateline":{"date":"2016-10-31T00:00:00-04:00","iso_date":"2016-10-31T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"hg_media":{"583350":{"id":"583350","type":"image","title":"Machine Learning + Cyber","body":null,"created":"1477942572","gmt_created":"2016-10-31 19:36:12","changed":"1477942572","gmt_changed":"2016-10-31 19:36:12","alt":"","file":{"fid":"222385","name":"Machine_learning_+_cyber_02.jpg","image_path":"\/sites\/default\/files\/images\/Machine_learning_%2B_cyber_02.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/Machine_learning_%2B_cyber_02.jpg","mime":"image\/jpeg","size":606576,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/Machine_learning_%2B_cyber_02.jpg?itok=YHCROhyC"}},"451391":{"id":"451391","type":"image","title":"IISP logo","body":null,"created":"1449256280","gmt_created":"2015-12-04 19:11:20","changed":"1475895192","gmt_changed":"2016-10-08 02:53:12","alt":"IISP logo","file":{"fid":"203339","name":"instituteforinformationsecurityprivacy-outline-black874.jpg","image_path":"\/sites\/default\/files\/images\/instituteforinformationsecurityprivacy-outline-black874_0.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/instituteforinformationsecurityprivacy-outline-black874_0.jpg","mime":"image\/jpeg","size":88082,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/instituteforinformationsecurityprivacy-outline-black874_0.jpg?itok=JGV2BzFy"}},"447071":{"id":"447071","type":"image","title":"Dr. Wenke Lee, IISP","body":null,"created":"1449256246","gmt_created":"2015-12-04 19:10:46","changed":"1475895187","gmt_changed":"2016-10-08 02:53:07","alt":"Dr. Wenke Lee, IISP","file":{"fid":"203234","name":"lee_iisp_sm.jpg","image_path":"\/sites\/default\/files\/images\/lee_iisp_sm_0.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/lee_iisp_sm_0.jpg","mime":"image\/jpeg","size":1130772,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/lee_iisp_sm_0.jpg?itok=_p3MZ7Pb"}}},"media_ids":["583350","451391","447071"],"groups":[{"id":"430601","name":"Institute for Information Security and Privacy"},{"id":"50877","name":"School of Computational Science and Engineering"},{"id":"50875","name":"School of Computer Science"},{"id":"47223","name":"College of Computing"}],"categories":[{"id":"153","name":"Computer Science\/Information Technology and Security"}],"keywords":[{"id":"1404","name":"Cybersecurity"},{"id":"9167","name":"machine learning"}],"core_research_areas":[{"id":"145171","name":"Cybersecurity"}],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cdiv\u003E\r\n\u003Cp\u003E\u003Cstrong\u003ETara La Bouff\u003C\/strong\u003E\u003Cbr \/\u003E\r\nMarketing Communications Manager\u003Cbr \/\u003E\r\n404.769.5408 (mobile)\u003Cbr \/\u003E\r\n\u003Ca href=\u0022mailto:tlabouff@iisp.gatech.edu\u0022\u003Etara.labouff@iisp.gatech.edu\u003C\/a\u003E\u003C\/p\u003E\r\n\u003C\/div\u003E\r\n","format":"limited_html"}],"email":["tara.labouff@iisp.gatech.edu"],"slides":[],"orientation":[],"userdata":""}}}