asteroza + learning + security   59

[1705.07386] DeepMasterPrints: Generating MasterPrints for Dictionary Attacks via Latent Variable Evolution
Using GAN's to make a master/skeleton key equivalent fingerprint to match ALL THE PEOPLE. This will not end well. Plus the principles are probably applicable to any other biometric authentication, perhaps including DNA that is not full sequenced...
biometric  security  research  deep  machine  learning  GAN  masterkey  skeletonkey  master  fingerprint 
november 2018 by asteroza
Chronicle Security - Homepage
Trying to operate cybersecurity more like an immune system, but first we need to hoover all that data into google for the machine learning...
google  moonshot  security  platfform  service  machine  learning  immune  system 
july 2018 by asteroza
New dataset for machine learning malware binary indicators
security  malware  AI  machine  learning  dataset  data  benchmark  research 
april 2018 by asteroza
[1712.09665] Adversarial Patch
Designing adversarial sticker patches to mess with machine/computer vision systems
adversarial  patch  sticker  camouflage  machine  learning  attack  security  research  computer  vision 
january 2018 by asteroza
SecurityIQ - InfoSec Institute
free phishing simulator for attacking your own employees, for a limited number of accounts...
security  testing  attack  phishing  email  learning  education  Delicious 
june 2016 by asteroza
Active Directory Protection | Identity Theft Detection | Aorato™
Active Directory protection software, that looks for irregular logon or authentication behavior compared to learned profiles of users. Since AD stuff gets more exposed as you federate to outside services, squelching attacks by finding anomalous authentication behavior becomes more important.
DAF  AD  directory  services  application  firewall  dynamic  learning  behavioral  anomaly  detection  profiling  security  software  Delicious 
january 2014 by asteroza

related tags

accelerated  accelerator  AD  addon  adivcce  adversarial  AI  algorithm  analysis  analytics  anomaly  anti-surveillance  application  assembly  attack  autoencoder  automated  AWS  behavioral  benchmark  biometric  biometrics  blueteam  book  books  BurpSuite  camouflage  capture  categorization  classification  cloud  collection  compputer  computer  Coursera  cracking  cryptography  DAF  damn  data  dataset  debugging  decoy  deep  defense  Delicious  demo  design  detection  development  devops  DFIR  digital  directory  disassembly  distribution  DSL  dumpsterfire  DVL  dynamic  education  email  engineering  environment  event  exploit  extension  face  facial  fingerprint  firewall  forensic  FPGA  framework  fraud  GAN  google  GPGPU  GPU  guidance  guide  hacking  home  honeypot  howto  humor  ID  IDS  image  immune  incident  information  infosec  intelligence  IPS  IR  irregularity  IT  kali  kernel  kubernetes  lab  learning  linux  list  live  liveCD  log  logging  machine  malicious  malware  map  mapping  master  masterkey  matching  ML  modeling  monitoring  moonshot  mouse  movement  network  networking  neural  NIDS  NSM  offensive  online  opensource  OPSEC  overlay  packet  patch  path  pattern  PC  penetration  pentesting  phishing  photo  picture  pivot  platfform  platform  playbook  plugin  practice  privacy  profiling  programming  protocol  query  radio  ranking  reading  recognition  red  reference  repository  research  response  reverse  RF  SaaS  sample  sandbox  SDR  security  server  service  services  sifter  signal  skeletonkey  software  splunk  SSL  stanford  sticker  string  sunglasses  surveillance  sysadmin  sysmon  system  team  tensorflow  test  testing  texture  threat  timebomb  tips  TLS  tools  trace  tracking  traffic  traingin  training  tricks  tutorial  utilities  video  vision  visual  visualization  VM  vulnerability  vulnerable  WAF  webapp  webdev  windows  YARA 

Copy this bookmark: