"rest": "Dealing the perfect hand - Shuffling memory blocks on z/OS\n\nSaturday at 16:00 in 101 Track\n\n\n\n45 minutes | Demo, Tool\n\n\n\nAyoul3 Pentester, Wavestone\n\nFollow me on a journey where we p0wn one of the most secure platforms on earth. "title": "Dealing the perfect hand - Shuffling memory blocks on z/OS ", Research interests include adversarial machine learning, deep learning, large-scale malware classification, active learning, and early time-series classification.\n\n\n" He received his PhD in Electrical Engineering (signal and image processing + machine learning) from the University of Washington and BS/MS degrees from Brigham Young University. Prior to joining Endgame he conducted information security and situational awareness research as a researcher at FireEye, Mandiant, Sandia National Laboratories and MIT Lincoln Laboratory. No math or machine learning background is required fundamental understanding of malware and Windows PE files is a welcome and previous experience hacking Atari Pong is a plus.\n\n\n\nHyrum Anderson\n\nHyrum Anderson is technical director of data scientist at Endgame, where he leads research on detecting adversaries and their tools using machine learning. In an analogous fashion, we demonstrate an AI agent that has learned through thousands of \"games\" against a next-gen AV malware detector which sequence of functionality-preserving changes to perform on a Windows PE malware file so that it bypasses the detector. Reinforcement learning has produced game-changing AI's that top human level performance in the game of Go and a myriad of hacked retro Atari games (e.g., Pong). In this talk, we demonstrate an AI agent trained through reinforcement learning to modify malware to evade machine learning malware detection. Less well appreciated, however, is that machine learning can be susceptible to attack by, ironically, other machine learning models. "rest": "Evading next-gen AV using artificial intelligence\n\nSaturday at 11:00 in Track 4\n\n\n\n20 minutes | Demo\n\n\n\nHyrum Anderson Technical Director of Data Science, Endgame\n\nMuch of next-gen AV relies on machine learning to generalize to never-before-seen malware. "title": "Evading next-gen AV using artificial intelligence ", Other interests include SDR and RF exploration, networking, cryptography, computer history, distributed computing.really anything that sounds cool that I happen to stumble on at 3am.\n\n\n" Holding no official training or technical employment, 0ctane spends most of their free time building and restoring older computer systems, hanging out at surplus stores and tracking down X86 alternatives with an occasional dabbling in OSX and 802.11 exploitation. This concept isn't \"unhacakable\", rather we believe it to be the most fixable this is what users and hackers should ultimately be fighting for.\n\n\n\n0ctane\n\n0ctane is a longtime hobbyist hacker, with experience primarily in UNIX systems and hardware. No blobs, no hidden firmware features, and no secret closed source processors. By using programmable logic chips, called Field Programmable Gate Arrays, this device is more open source than any common personal computing system to date. Advanced attackers in possession of firmware signing keys, and even potential access to chip fabrication, could wreak untold havoc on cryptographic devices we rely on.\n\n\n\nAfter surveying all-too-possible low level attacks on critical systems, we will introduce an alternative open source solution to peace-of-mind cryptography and private computing. Embedded technologies like Intel Management Engine pose significant threats when, not if, they get exploited. However, below the surface of open source operating systems, strictly closed source firmware along with device driver blobs and closed system architecture prevent users from examining, understanding, and trusting the systems where they run their private computations. The rise of Free and Open Source Software has led to more secure and heavily scrutinized cryptographic solutions. "rest": "Untrustworthy Hardware and How to Fix It\n\nSunday at 10:00 in Track 4\n\n\n\n20 minutes | Demo, Tool\n\n\n\n0ctane Hacker\n\nModern computing platforms offer more freedom than ever before. "title": "Untrustworthy Hardware and How to Fix It ",
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |