all InfoSec news
Stealing Malware Classifiers and AVs at Low False Positive Conditions. (arXiv:2204.06241v1 [cs.CR])
April 14, 2022, 1:20 a.m. | Maria Rigaki, Sebastian Garcia
cs.CR updates on arXiv.org arxiv.org
Model stealing attacks have been successfully used in many machine learning
domains, but there is little understanding of how these attacks work in the
malware detection domain. Malware detection and, in general, security domains
have very strong requirements of low false positive rates (FPR). However, these
requirements are not the primary focus of the existing model stealing
literature. Stealing attacks create surrogate models that perform similarly to
a target model using a limited amount of queries to the target. The …
More from arxiv.org / cs.CR updates on arXiv.org
Jobs in InfoSec / Cybersecurity
SOC 2 Manager, Audit and Certification
@ Deloitte | US and CA Multiple Locations
Check Team Members / Cyber Consultants / Pen Testers
@ Resillion | Birmingham, United Kingdom
Security Officer Field Training Officer- Full Time (Harrah's LV)
@ Caesars Entertainment | Las Vegas, NV, United States
Cybersecurity Subject Matter Expert (SME)
@ SMS Data Products Group, Inc. | Fort Belvoir, VA, United States
AWS Security Engineer
@ IntelliPro Group Inc. | Palo Alto, CA
Information Security Analyst
@ Freudenberg Group | Alajuela