Infosecurity.US

Information Security & Occasional Forays Into Adjacent Realms

  • Web Log

via the inimitable Daniel Stori at Turnoff.US!

Daniel Stori's Turnoff.US: ‘My Sweet ML Model’ →

October 14, 2024 by Marc Handelman in Daniel Stori, Turnoff.US, Machine Learning, Machine Learning Sarcasm, Satire
October 14, 2024 /Marc Handelman
Daniel Stori, Turnoff.US, Machine Learning, Machine Learning Sarcasm, Satire

Purdue University's CERIAS 2021 Security Symposium - Gary McGraw's 'Security Engineering for Machine Learning' →

March 30, 2022 by Marc Handelman in Purdue University CERIAS, Security Symposium, Education, Security, Cybersecurity Education, Machine Learning

Our thanks to Purdue University’s The Center for Education and Research in Information Assurance and Security (CERIAS) for publishing their illuminating security symposiums, seminars, talks, and presentations on the Schools’ YouTube channel.

March 30, 2022 /Marc Handelman
Purdue University CERIAS, Security Symposium, Education, Security, Cybersecurity Education, Machine Learning

Purdue University's CERIAS 2021 Security Symposium - Nasir Memon's 'AI, Computational Imaging And The Battle for Media Integrity' →

March 25, 2022 by Marc Handelman in Purdue University CERIAS, Security Symposium, Education, Security, Cybersecurity Education, Infosec Education, Artificial Intelligence, Machine Learning

Our thanks to Purdue University’s The Center for Education and Research in Information Assurance and Security (CERIAS) for publishing their illuminating security symposiums, seminars, talks, and presentations on the Schools’ YouTube channel.

March 25, 2022 /Marc Handelman
Purdue University CERIAS, Security Symposium, Education, Security, Cybersecurity Education, Infosec Education, Artificial Intelligence, Machine Learning

Edmond Awad discusses "Crowdsourcing Moral Machines," a Contributed Article in the March 2020 edition of the Communications of the ACM Magazine.

Communications of the ACM, March 2020 - Edmond Awad's, Sohan Dsouza's, Jean-François Bonnefon's, Azim Shariff's, Iyad Rahwan's 'Crowdsourcing Moral Machines' →

February 25, 2020 by Marc Handelman in ACM, Machine Learning
February 25, 2020 /Marc Handelman
ACM, Machine Learning

DEF CON 27, Artificial Intelligence Village - Dr Ethan Rudd's 'Loss Is More Improving Malware Detectors' →

February 21, 2020 by Marc Handelman in Artificial Intelligence, Conferences, DEF CON 27, Education, Information Security, Machine Learning

Thanks to Def Con 27 Volunteers, Videographers and Presenters for publishing their superlative conference videos via their YouTube Channel for all to see, enjoy and learn.

February 21, 2020 /Marc Handelman
Artificial Intelligence, Conferences, DEF CON 27, Education, Information Security, Machine Learning

DEF CON 27, Artificial Intelligence Village - Hyrum Anderson's 'Competitions In Infosec Machine Learning' →

February 20, 2020 by Marc Handelman in Artificial Intelligence, Conferences, DEF CON 27, Education, Information Security, Machine Learning, Security Machine Learning

Thanks to Def Con 27 Volunteers, Videographers and Presenters for publishing their superlative conference videos via their YouTube Channel for all to see, enjoy and learn.

February 20, 2020 /Marc Handelman
Artificial Intelligence, Conferences, DEF CON 27, Education, Information Security, Machine Learning, Security Machine Learning

POTS - Protective Optimization Technologies: May The Algorithm Be With You

February 05, 2020 by Marc Handelman in Information Security, Machine Learning, Must Read, Algorithmic Fairness

via Adrian Colyer (a Venture Partner at London, UK ensconced Accel, and writing at The Morning Paper comes a sperlative analysis of this outstanding scholarly paper entitled POTS: Protective Optimization Technologies - authored by Bogdan Kulynych, Rebekah Overdorf, Carmela Troncoso and, Seda Gürses - focusing on the examination of 'Algorithmic Fairness'. Todays Must Read. Citation, POTS: Protective optimization technologies, Kulynych, Overdorf et al., arXiv 2019 https://arxiv.org/abs/1806.02711

Citation, POTS: Protective optimization technologies, Kulynych, Overdorf et al., arXiv 2019 https://arxiv.org/abs/1806.02711

February 05, 2020 /Marc Handelman
Information Security, Machine Learning, Must Read, Algorithmic Fairness

Derbycon 2019, Will Pearce's & Nick Landers' '42: The Answer To Life, The Universe, And Everything Offensive Security' →

October 23, 2019 by Marc Handelman in Information Security, Irongeek, Machine Learning, Education, DerbyCon, Conferences

Many Thanks to Adrian Crenshaw (Irongeek), and his Videographer Colleagues for Sharing His and Their Outstanding Videos Of This Last And Important DerbyCon 2019. Visit Irongeek for additional production credits and additional information. Subscribe to Irongeek's content, and provide Patreon support as well.

October 23, 2019 /Marc Handelman
Information Security, Irongeek, Machine Learning, Education, DerbyCon, Conferences

USENIX Enigma 2019, Lorenzo Cavallaro's 'When The Magic Wears Off: Flaws In ML For Security Evaluations' →

September 24, 2019 by Marc Handelman in USENIX Enigma 2019, Machine Learning, Information Security, Education, Conferences

Thanks to USENIX for publishing the USENIX Enigma 2019

outstanding conference videos on their YouTube Channel

September 24, 2019 /Marc Handelman
USENIX Enigma 2019, Machine Learning, Information Security, Education, Conferences

Security BSides London 2019, Lorenzo Cavallaro's 'When the Magic Wears Off: Flaws In ML For Security Evaluations' →

September 03, 2019 by Marc Handelman in BSides London 2019, Conferences, Education, Information Security, Machine Learning

Many thanks to Security BSides London for publishing their outstanding conference videos on YouTube.

September 03, 2019 /Marc Handelman
BSides London 2019, Conferences, Education, Information Security, Machine Learning

When a Tree Falls in St. Louis, Will the Power Go Out?

May 09, 2019 by Marc Handelman in Physical Power Networks, Forestry, Artificial Intelligence, Machine VIsion, Machine Learning, UAV, ICS/SCADA, ICS, Electrical Engineering, Infrastructure, Infrastructure Security

A superlative bit of combinatorial scholarship coming out of St. Louis University, where Sean Hartling, Vasit Sagan, Paheding Sidike, Maitiniyazi Maimaitijiang and Joshua Carron have lashed-up geospatial sciences, machine learning, UAVs, and no-small level of intellectual virtuosity to study trees, the natural felling thereof, and power outages. Todays' Must Read for you ICS Boffins and Foresty geeks (while not ignoring the AI, ML, UAv and Network Information Security types as well).

"At SLU, geospatial science meets machine learning. In a study recently published in Sensors, Saint Louis University researchers paired satellite imaging data with machine learning techniques to map local tree species and health. The data generated by the project will help inform best practices for managing healthy green spaces as well as trimming programs to avoid power outages following storms." - via Carrie Bebermeyer, Senior Media Relations Specialist at St. Louis University

May 09, 2019 /Marc Handelman
Physical Power Networks, Forestry, Artificial Intelligence, Machine VIsion, Machine Learning, UAV, ICS/SCADA, ICS, Electrical Engineering, Infrastructure, Infrastructure Security

via the comic content delivery system known as  Randal Munroe at XKCD!

XKCD, New Phone Thread

July 06, 2018 by Marc Handelman in XKCD, Satire, Sarcasm, Humor, Security Humor, Machine Learning, Artificial Intelligence, Pseudo-AI
July 06, 2018 /Marc Handelman
XKCD, Satire, Sarcasm, Humor, Security Humor, Machine Learning, Artificial Intelligence, Pseudo-AI

Joscha Bach, Ph.D., 'The Lebowski Theorem of Machine Superintelligence' →

April 18, 2018 by Marc Handelman in Machine Learning, Information Security, Reward and Punishment, Philosophy, Superintelligence

via Jason Kottke, comes a Lebowski Cogitation with sterling credentials, in which, the Dude wades in with his take on machine learning (in reality {if you like that sort of thing} via a twitter message by Joscha Back, Ph.D,); utilizing the non-virtual Jeffrey Lebowski (whom, of course, abides, if only on celluloid, and bits on the wire,) as the vector:

'No superintelligent AI is going to bother with a task that is harder than hacking its reward function.' - The Lebowski Theorem - Joscha Back, Ph.D.

April 18, 2018 /Marc Handelman
Machine Learning, Information Security, Reward and Punishment, Philosophy, Superintelligence

OWASP APPSEC Cali 2018, Davi Ottenheimer's 'Unpoisoned Fruit: Seeding Trust Into A Growing World of Algorithmic Warfare' →

April 14, 2018 by Marc Handelman in OWASP, Application Security, Artificial Intelligence, Machine Learning, Information Security
April 14, 2018 /Marc Handelman
OWASP, Application Security, Artificial Intelligence, Machine Learning, Information Security

From Solving a Higgs optimization problem with quantum annealing for machine learning [https://www.nature.com/nature/journal/v550/n7676/full/nature24047.html ]

The Uncovering →

November 01, 2017 by Marc Handelman in AI Security, All is Information, Information Sciences, Machine Learning, Quantum Mathematics

Via Chris Lee - writing at Ars Technica, comes news of the 'uncovering' of the Higgs Boson particle via the utilization (in the machine-learning realm) of a D-Wave Quantum Computational Device.

'The discovery of Higgs-boson decays in a background of standard-model processes was assisted by machine learning methods 1, 2. The classifiers used to separate signals such as these from background are trained using highly unerring but not completely perfect simulations of the physical processes involved, often resulting in incorrect labelling of background processes or signals (label noise) and systematic errors.' - via Nature 550, 375–379 (19 October 2017) doi:10.1038/nature24047

November 01, 2017 /Marc Handelman
AI Security, All is Information, Information Sciences, Machine Learning, Quantum Mathematics

USENIX Enigma 2017, Dave Evans' 'Classifiers under Attack' →

September 15, 2017 by Marc Handelman in Conferences, Information Security, Machine Learning, Computation, Computer Science
September 15, 2017 /Marc Handelman
Conferences, Information Security, Machine Learning, Computation, Computer Science

USENIX Enigma 2017 — Nestan Tsiskaridze's 'Leveraging the Power of Automated Reasoning in Security Analysis of Web Applications and Beyond' →

September 01, 2017 by Marc Handelman in All is Information, Alternate Attack Analysis, AI Security, Conferences, Data That Is Big, Data Driven Security, Education, Information Security, Machine Learning

This is a joint work with Clark Barrett (NYU/Stanford University), Morgan Deters (NYU), Tianyi Liang (The University of Iowa), Andrew Reynolds (The University of Iowa/EPFL), Cesare Tinelli (The University of Iowa) and Nestan Tsiskaridze, University of California, Santa Barbara.

September 01, 2017 /Marc Handelman
All is Information, Alternate Attack Analysis, AI Security, Conferences, Data That Is Big, Data Driven Security, Education, Information Security, Machine Learning

DEF CON 25, Dan Petro's & Ben Morris' 'Weaponizing Machine Learning' →

August 15, 2017 by Marc Handelman in All is Information, Alternate Attack Vectors, Conferences, Brilliant, Education, Information Security, Machine Learning
August 15, 2017 /Marc Handelman
All is Information, Alternate Attack Vectors, Conferences, Brilliant, Education, Information Security, Machine Learning

Machine-Based Investigation: Fully →

March 14, 2017 by Marc Handelman in All is Information, Analytics, Computation, Data That Is Big, Exploration, Fingerprinting, Information Sciences, Intelligence, Robots, Machine Learning

via Motherboard writer Michael Byrne, comes this well-wrought piece on the apparent proliferation of 'bots on Twitter, ie., the implications of algorithm-driven entities on the Twitterverse. The fascinating component to this study by Onur Varol, Emilio Ferrara, Clayton A. Davis, Filippo Menczer and Alessandro Flammini, was the utilization of a machine-learning apparatus (and the feature-sets therein) to tease out the truth. Additional documentation (in the form of the paper) is available on arXIv. Today's MustRead.

"Part of what makes the new research interesting is the sheer number of features used in the classification model..." - Motherboard's Michael Byrne

March 14, 2017 /Marc Handelman
All is Information, Analytics, Computation, Data That Is Big, Exploration, Fingerprinting, Information Sciences, Intelligence, Robots, Machine Learning

33c3, Joscha's 'Machine Dreams' →

January 20, 2017 by Marc Handelman in All is Information, Artificial Intelligence, Conferences, Information Security, Machine Learning
January 20, 2017 /Marc Handelman
All is Information, Artificial Intelligence, Conferences, Information Security, Machine Learning
  • Newer
  • Older