IS593: Machine Learning Application Trends in Information Security
The course is a paper reading class. The class will cover a list of papers published at the prestigious security conferences. Each student will present assigned papers and lead discussions. The goal of the course is to understand the trends in applying machine learning algorithms on computer security problems as well as to seek an in-depth understanding of the covered research papers.
Basic Information
- Lecture: Friday 9:00 AM - 11:45 AM
- Instructor: Sooel Son
- Email: sl.son (at) kaist.ac.kr
- Homepage: https://sites.google.com/site/ssonkaist/
- Lecture room: N1 102
- Office hours: Every Tuesday 10:30 AM to 11:50 AM
- T.A.: Suyoung Lee, suyoung.lee (at) kaist.ac.kr
Evaluation
- Attendance & Class participation: 15%
- Paper critiques: 15%
- Paper Presentation #1: 10%
- Paper Presentation #2: 10%
- Paper Presentation #3: 10%
- Project proposal & Midpoint evaluation : 10%
- Final project: 30%
Schedule
- 9/4 Course Introduction
- [0]] Course Introduction (https://github.com/spostman/spostman.github.io/raw/master/slides/1.cs492_intro.pdf)
- [1] Zhou et al. Hardware Performance Counters Can Detect Malware: Myth or Fact? (ASIACCS 2018)
- Presenter: Sooel Son
- 9/11
- [2] Bilge et al. RiskTeller: Predicting the Risk of Cyber Incidents. (CCS 2017)
- Presenter: Sooel Son
- [3] Xu et al. Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity Detection. (CCS 2017)
- Presenter: Suyoung Lee
- 9/18
- [4] When Coding Style Survives Compilation: De-anonymizing Programmers from Executable Binaries. (NDSS 2018)
- [5] Song et al. Machine Learning Models That Remember Too Much. (CCS 2017)
- 9/25
- [6] Schuster et al. Beauty and the Burst: Remote Identification of Encrypted Video Streams (Usenix 2017)
- [7] Barradas et al. Effective Detection of Multimedia Protocol Tunneling using Machine Learning. (Usenix 2018)
-
10/2 No class (Holiday)
-
10/9 No class (Holiday)
- 10/16
- [8] Shokri et al. Membership Inference Attacks Against Machine Learning Models. (S&P 2017)
- [9] Pygelis et al. Knock Knock, Who’s There? Membership Inference on Aggregate Location Data. (NDSS 2018)
-
10/23 Midterm season
- 10/30
- [10] Pei et al. DeepXplore: Automated Whitebox Testing of Deep Learning Systems. (SOSP 2017)
- [11] Tial et al. DeepTest: Automated Testing of Deep-Neural-Network-driven Autonomous Cars. (ICSE 2018)
- 11/6
- Project Midterm Evaluation
- 11/13
- [12] Calini et al. Towards Evaluating the Robustness of Neural Networks. (S&P 2017)
- [13] Meng et al. MagNet: a Two-Pronged Defense against Adversarial Examples. (CCS 2017)
- 11/20
- [14] Yinzheng et al. Practical Attacks Against Graph-based Clustering. (CCS 2017)
- [15] Ye et al. Yet Another Text Captcha Solver: A Generative Adversarial Network Based Approach. (CCS 2018)
- 11/27
- [16] Wang et al. With Great Training Comes Great Vulnerability: Practical Attacks against Transfer Learning. (Usenix 2018)
- [17] Suciu et al. When Does Machine Learning FAIL? Generalized Transferability for Evasion and Poisoning Attacks. (Usenix 2018)
- 12/4
- [22] Song et al. Auditing Data Provenance in Text-Generation Models. (KDD 2019)
- [21] Melis et al. Exploiting Unintended Feature Leakage in Collaborative Learning. (S&P 2019)
- 12/11
- Project presentation