李峰是印第安那大学普渡大学印第安纳波利斯分校（IUPUI）普渡大学工程与技术学院计算机信息与技术系主任兼副教授（终身教授）。他的研究兴趣包括网络安全，移动计算和无线网络，社交网络中的隐私保护以及人工智能中的安全和隐私保护。李博士定期出版学术期刊，会议论文集和书籍章节。李博士是2015年ACM计算机和通信安全会议（CCS）和2013年IEEE国际分布式计算系统会议（ICDCS）的Publication Chair和组织委员会成员，REU网络和系统研究研讨会2017， 2016 和2014 TPC主席（REUNS）。他是IEEE国际计算机通信会议（INFOCOM 2010, 2011, 2012, 2013, 2014, 2015, 2016, 2017, 2018和2019）以及其他许多国际会议的Technical Program Committee成员。
Adversarial Machine Learning: Attacker’s Strategy in Android Malware Detection via Graphlet Sampling
Feng Li is the Chair and Associate Professor in the Department of Computer Information & Graphics Technology within the Purdue School of Engineering and Technology, at Indiana University-Purdue University Indianapolis (IUPUI). His current research interests include cybersecurity, mobile computing and wireless networks, cloud and distributed computing, privacy protection in social networks, and security and privacy in machine learning. Dr. Li regularly publishes in scholarly journals, conference proceedings, and book chapters. Dr. Li was the Publication Co-Chair and Organization Committee Member for 2015 ACM Conference on Computer and Communications Security (CCS) and 2013 IEEE International Conference on Distributed Computing Systems (ICDCS), TPC Chair for National Workshop for REU Research in Networking and Systems (REUNS) 2017, 2016 and 2014. He was the Technical Program Committee member for IEEE International Conference on Computer Communications (INFOCOM 2010, 2011, 2012, 2013, 2014, 2015, 2016, 2017, 2018 and 2019) and many other international conferences.
The Cybersecurity defense and malware detection schemes are increasingly using machine-learning-based signature and vulnerability detection to relieve human experts from the tedious and subjective task of manually defining features. However, this inevitably devolves into the cat-and-mouse game seen in many facets of security. Traditionally, attackers evade signatures and heuristics, and they evade statistical models too. In this talk, Feng Li offers some background on the academic security world’s attempt at understanding how to break and fix Machine-Learning-based Cybersecurity systems. He will discuss the design of an Android Malware Detection scheme via Graphlet-Sampling-based machine learning. With the context from this case study, he will discuss serval possible strategies for the attackers to evade the detection or poison the machine learning. These sophisticated attackers clearly motivate the need to study the Adversarial Machine Learning (ML) in the Cybersecurity.
Android systems are widely used in mobile & wireless distributed systems. However, with the popularity of Android-based smartphones/tablets comes the rampancy of Android-based malware. We first introduce our design of a novel topological signature based ML scheme for Android apps, using the function call graphs (FCGs) extracted from their Android App PacKages (APKs). Specifically, by leveraging recent advances on graphlet mining, the proposed method fully captures the invocator-invocatee relationship at local neighborhoods in an FCG. Using real benign app and malware samples, we demonstrate that our method, ACTS (App topological signature through graphlet Sampling), can detect malware and identify malware families robustly and efficiently. Using the context of this learning-based Cybersecurity scheme, we switch to the attackers’ point-of-view and explore they strategy space to counter the ML-design. We will discuss some possible strategies in adversarial data manipulation for the attackers to evade the classification, poison the ML model, and/or violate the privacy of the users of the learning-based Cybersecurity scheme.
版权所有©湖南大学2017 湖南大学党委宣传部 地址：湖南省长沙市岳麓区麓山南路麓山门 邮编：410082 Email：email@example.com 域名备案信息：[www.hnu.edu.cn,www.hnu.cn/湘ICP备05000239号] [hnu.cn 湘教QS3-200503-000481 hnu.edu.cn 湘教QS4-201312-010059]