<node id="623785">
  <nid>623785</nid>
  <type>news</type>
  <uid>
    <user id="34540"><![CDATA[34540]]></user>
  </uid>
  <created>1564433159</created>
  <changed>1653584976</changed>
  <title><![CDATA[MLsploit Tackles Machine Learning Security with a Cloud-based Platform]]></title>
  <body><![CDATA[<p>Machine Learning (ML) algorithms are pervasive in our daily lives and are the basis for everything from suggestions on streaming platforms to fraud detection services, yet recent research has found that they are highly vulnerable to attacks.&nbsp;These attacks come in many forms, including bypassing Android and Linux malware detection, and attacking deep learning models for image misclassification and objection detection.&nbsp;</p>

<p>To patch these vulnerabilities and increase security for safety-critical applications, researchers at Georgia Tech and Intel have teamed up to create&nbsp;<a href="https://mlsploit.github.io/">MLsploit</a>. It is&nbsp;the first user-friendly, cloud-based framework that enables researchers and developers to rapidly evaluate and compare state-of-the-art adversarial attacks and defenses for ML models.&nbsp;</p>

<p><strong>What Does MLsploit Do?</strong></p>

<p>MLsploit&rsquo;s web interface is open-source and allows researchers to quickly perform experiments on attack and defense algorithms by easily adjusting their parameters. Once tests are finished, the user may store the results in the framework to serve as a growing database for future adversarial ML research to build on.</p>

<p>&ldquo;MLsploit is unique in that it is a collection and repository in the specific space of adversarial ML,&rdquo; said&nbsp;<a href="https://www.cse.gatech.edu/">School of Computational Science and Engineering</a>&nbsp;Ph.D. student&nbsp;<strong>Nilaksh Das</strong>, a primary student investigator of the project.</p>

<p>MLsploit researchers built the tool as the springboard for students and researchers in adversarial ML, deep learning practitioners in industry who want to perform in-depth experimentation on a new model before rolling it out for private or public use.</p>

<p>&ldquo;Ultimately, our goal is for MLsploit to become a collection of all the literature in the adversarial ML space,&rdquo; he said.</p>

<p><strong>How Does MLsploit Work?</strong></p>

<p>MLsploit was built to be modular so that users can easily integrate their own work into the framework.&nbsp;</p>

<p>MLsploit provides the user the web-user interface and the back-end computation engine. Then, the user can upload their own modules or functions. Once these are created, they can be used in conjunction with the whole MLsploit framework.</p>

<p>The tool was developed at the&nbsp;<a href="http://istc-arsa.iisp.gatech.edu/">Intel&reg; Science &amp; Technology Center for Adversary-Resilient Security Analytics</a>&nbsp;(ISTC-ARSA) housed at Tech. The center specializes in&nbsp;identifying vulnerabilities of ML algorithms and developing new security approaches to improve the resilience of ML applications.The project represents a culmination of the last three years of research in the center.&nbsp;</p>

<p>MLsploit was first presented at&nbsp;<a href="https://www.blackhat.com/asia-19/">Black Hat Asia 2019</a>&nbsp;and will be presented again as a Project Showcase at the&nbsp;<a href="https://www.kdd.org/kdd2019/">25<sup>th&nbsp;</sup>ACM SIGKDD Conference on Knowledge Discovery and Data Mining</a>.</p>

<p>An extended abstract and complete listing of co-authors for the paper can be found&nbsp;<a href="https://istc-arsa.iisp.gatech.edu/mlsploit-extended-abstract-to-appear-in-kdd-2019.html">here</a>.</p>
]]></body>
  <field_subtitle>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_subtitle>
  <field_dateline>
    <item>
      <value>2019-07-29T00:00:00-04:00</value>
      <timezone><![CDATA[America/New_York]]></timezone>
    </item>
  </field_dateline>
  <field_summary_sentence>
    <item>
      <value><![CDATA[Georgia Tech and Intel researchers launch MLsploit, a cloud-based platform for researching adversarial Machine Learning.]]></value>
    </item>
  </field_summary_sentence>
  <field_summary>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_summary>
  <field_media>
          <item>
        <nid>
          <node id="623781">
            <nid>623781</nid>
            <type>image</type>
            <title><![CDATA[MLsploit]]></title>
            <body><![CDATA[]]></body>
                          <field_image>
                <item>
                  <fid>237584</fid>
                  <filename><![CDATA[Screen Shot 2019-07-22 at 5.16.18 PM.png]]></filename>
                  <filepath><![CDATA[/sites/default/files/images/Screen%20Shot%202019-07-22%20at%205.16.18%20PM.png]]></filepath>
                  <file_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/Screen%20Shot%202019-07-22%20at%205.16.18%20PM.png]]></file_full_path>
                  <filemime>image/png</filemime>
                  <image_740><![CDATA[]]></image_740>
                  <image_alt><![CDATA[A diagram showing how MLsploit feeds algorithms through its framework]]></image_alt>
                </item>
              </field_image>
            
                      </node>
        </nid>
      </item>
      </field_media>
  <field_contact_email>
    <item>
      <email><![CDATA[kristen.perez@cc.gatech.edu]]></email>
    </item>
  </field_contact_email>
  <field_location>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_location>
  <field_contact>
    <item>
      <value><![CDATA[<p>Kristen Perez - Communications Officer</p>]]></value>
    </item>
  </field_contact>
  <field_sidebar>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_sidebar>
  <field_boilerplate>
    <item>
      <nid><![CDATA[]]></nid>
    </item>
  </field_boilerplate>
  <!--  TO DO: correct to not conflate categories and news room topics  -->
  <!--  Disquisition: it's funny how I write these TODOs and then never
         revisit them. It's as though the act of writing the thing down frees me
         from the responsibility to actually solve the problem. But what can I
         say? There are more problems than there's time to solve.  -->
  <links_related> </links_related>
  <files> </files>
  <og_groups>
      </og_groups>
  <og_groups_both>
          <item>
        <![CDATA[Student and Faculty]]>
      </item>
          <item>
        <![CDATA[Student Research]]>
      </item>
          <item>
        <![CDATA[Research]]>
      </item>
      </og_groups_both>
  <field_categories>
          <item>
        <tid>134</tid>
        <value><![CDATA[Student and Faculty]]></value>
      </item>
          <item>
        <tid>8862</tid>
        <value><![CDATA[Student Research]]></value>
      </item>
          <item>
        <tid>135</tid>
        <value><![CDATA[Research]]></value>
      </item>
      </field_categories>
  <core_research_areas>
          <term tid="145171"><![CDATA[Cybersecurity]]></term>
          <term tid="39501"><![CDATA[People and Technology]]></term>
      </core_research_areas>
  <field_news_room_topics>
      </field_news_room_topics>
  <links_related>
      </links_related>
  <files>
      </files>
  <og_groups>
      </og_groups>
  <og_groups_both>
      </og_groups_both>
  <field_keywords>
          <item>
        <tid>181831</tid>
        <value><![CDATA[MLsploit]]></value>
      </item>
          <item>
        <tid>83261</tid>
        <value><![CDATA[Polo Chau]]></value>
      </item>
          <item>
        <tid>181832</tid>
        <value><![CDATA[Nilaksh Das]]></value>
      </item>
          <item>
        <tid>181833</tid>
        <value><![CDATA[cse-cyber]]></value>
      </item>
          <item>
        <tid>181220</tid>
        <value><![CDATA[cse-ml]]></value>
      </item>
      </field_keywords>
  <field_userdata>
      <![CDATA[]]>
  </field_userdata>
</node>
