Skip to main content

Showing 1–12 of 12 results for author: Oesch, S

  1. arXiv:2407.01529  [pdf, other

    cs.CR cs.LG

    On the Abuse and Detection of Polyglot Files

    Authors: Luke Koch, Sean Oesch, Amul Chaulagain, Jared Dixon, Matthew Dixon, Mike Huettal, Amir Sadovnik, Cory Watson, Brian Weber, Jacob Hartman, Richard Patulski

    Abstract: A polyglot is a file that is valid in two or more formats. Polyglot files pose a problem for malware detection systems that route files to format-specific detectors/signatures, as well as file upload and sanitization tools. In this work we found that existing file-format and embedded-file detection tools, even those developed specifically for polyglot files, fail to reliably detect polyglot files… ▽ More

    Submitted 1 July, 2024; originally announced July 2024.

    Comments: 18 pages, 11 figures

  2. arXiv:2404.10788  [pdf, other

    cs.CR cs.AI

    The Path To Autonomous Cyber Defense

    Authors: Sean Oesch, Phillipe Austria, Amul Chaulagain, Brian Weber, Cory Watson, Matthew Dixson, Amir Sadovnik

    Abstract: Defenders are overwhelmed by the number and scale of attacks against their networks.This problem will only be exacerbated as attackers leverage artificial intelligence to automate their workflows. We propose a path to autonomous cyber agents able to augment defenders by automating critical steps in the cyber defense life cycle.

    Submitted 12 April, 2024; originally announced April 2024.

    Comments: 9 pages, 3 figures

  3. arXiv:2308.14835  [pdf, other

    cs.CR

    AI ATAC 1: An Evaluation of Prominent Commercial Malware Detectors

    Authors: Robert A. Bridges, Brian Weber, Justin M. Beaver, Jared M. Smith, Miki E. Verma, Savannah Norem, Kevin Spakes, Cory Watson, Jeff A. Nichols, Brian Jewell, Michael. D. Iannacone, Chelsey Dunivan Stahl, Kelly M. T. Huffer, T. Sean Oesch

    Abstract: This work presents an evaluation of six prominent commercial endpoint malware detectors, a network malware detector, and a file-conviction algorithm from a cyber technology vendor. The evaluation was administered as the first of the Artificial Intelligence Applications to Autonomous Cybersecurity (AI ATAC) prize challenges, funded by / completed in service of the US Navy. The experiment employed 1… ▽ More

    Submitted 28 August, 2023; originally announced August 2023.

  4. Testing SOAR Tools in Use

    Authors: Robert A. Bridges, Ashley E. Rice, Sean Oesch, Jeff A. Nichols, Cory Watson, Kevin Spakes, Savannah Norem, Mike Huettel, Brian Jewell, Brian Weber, Connor Gannon, Olivia Bizovi, Samuel C Hollifield, Samantha Erwin

    Abstract: Modern security operation centers (SOCs) rely on operators and a tapestry of logging and alerting tools with large scale collection and query abilities. SOC investigations are tedious as they rely on manual efforts to query diverse data sources, overlay related logs, and correlate the data into information and then document results in a ticketing system. Security orchestration, automation, and res… ▽ More

    Submitted 14 February, 2023; v1 submitted 11 August, 2022; originally announced August 2022.

    Journal ref: Computers & Security 2023

  5. arXiv:2203.07561  [pdf, other

    cs.CR cs.LG

    Toward the Detection of Polyglot Files

    Authors: Luke Koch, Sean Oesch, Mary Adkisson, Sam Erwin, Brian Weber, Amul Chaulagain

    Abstract: Standardized file formats play a key role in the development and use of computer software. However, it is possible to abuse standardized file formats by creating a file that is valid in multiple file formats. The resulting polyglot (many languages) file can confound file format identification, allowing elements of the file to evade analysis.This is especially problematic for malware detection syst… ▽ More

    Submitted 12 April, 2022; v1 submitted 14 March, 2022; originally announced March 2022.

  6. arXiv:2112.00100  [pdf, other

    cs.HC

    A Mathematical Framework for Evaluation of SOAR Tools with Limited Survey Data

    Authors: Savannah Norem, Ashley E Rice, Samantha Erwin, Robert A Bridges, Sean Oesch, Brian Weber

    Abstract: Security operation centers (SOCs) all over the world are tasked with reacting to cybersecurity alerts ranging in severity. Security Orchestration, Automation, and Response (SOAR) tools streamline cybersecurity alert responses by SOC operators. SOAR tool adoption is expensive both in effort and finances. Hence, it is crucial to limit adoption to those most worthwhile; yet no research evaluating or… ▽ More

    Submitted 30 November, 2021; originally announced December 2021.

  7. arXiv:2105.06545  [pdf

    cs.CR

    What Clinical Trials Can Teach Us about the Development of More Resilient AI for Cybersecurity

    Authors: Edmon Begoli, Robert A. Bridges, Sean Oesch, Kathryn E. Knight

    Abstract: Policy-mandated, rigorously administered scientific testing is needed to provide transparency into the efficacy of artificial intelligence-based (AI-based) cyber defense tools for consumers and to prioritize future research and development. In this article, we propose a model that is informed by our experience, urged forward by massive scale cyberattacks, and inspired by parallel developments in t… ▽ More

    Submitted 13 May, 2021; originally announced May 2021.

  8. The Emperor's New Autofill Framework: A Security Analysis of Autofill on iOS and Android

    Authors: Sean Oesch, Anuj Gautam, Scott Ruoti

    Abstract: Password managers help users more effectively manage their passwords, encouraging them to adopt stronger passwords across their many accounts. In contrast to desktop systems where password managers receive no system-level support, mobile operating systems provide autofill frameworks designed to integrate with password managers to provide secure and usable autofill for browsers and other apps insta… ▽ More

    Submitted 28 September, 2021; v1 submitted 20 April, 2021; originally announced April 2021.

    Comments: 12 pages, 3 pages appendix, published at ACSAC 2021

  9. arXiv:2012.09244  [pdf, other

    cs.HC cs.SI

    An Integrated Platform for Collaborative Data Analytics

    Authors: Sean Oesch, Rob Gillen, Tom Karnowski

    Abstract: While collaboration among data scientists is a key to organizational productivity, data analysts face significant barriers to achieving this end, including data sharing, accessing and configuring the required computational environment, and a unified method of sharing knowledge. Each of these barriers to collaboration is related to the fundamental question of knowledge management "how can organizat… ▽ More

    Submitted 16 December, 2020; originally announced December 2020.

  10. arXiv:2012.09214  [pdf, other

    cs.CR cs.LG

    Beyond the Hype: A Real-World Evaluation of the Impact and Cost of Machine Learning-Based Malware Detection

    Authors: Robert A. Bridges, Sean Oesch, Miki E. Verma, Michael D. Iannacone, Kelly M. T. Huffer, Brian Jewell, Jeff A. Nichols, Brian Weber, Justin M. Beaver, Jared M. Smith, Daniel Scofield, Craig Miles, Thomas Plummer, Mark Daniell, Anne M. Tall

    Abstract: In this paper, we present a scientific evaluation of four prominent malware detection tools to assist an organization with two primary questions: To what extent do ML-based tools accurately classify previously- and never-before-seen files? Is it worth purchasing a network-level malware detector? To identify weaknesses, we tested each tool against 3,536 total files (2,554 or 72\% malicious, 982 or… ▽ More

    Submitted 17 August, 2022; v1 submitted 16 December, 2020; originally announced December 2020.

    Comments: Includes Actionable Takeaways for SOCs

    Journal ref: Digital Threats: Research and Practice 2023

  11. arXiv:2012.09013  [pdf, other

    cs.HC cs.CR cs.LG

    An Assessment of the Usability of Machine Learning Based Tools for the Security Operations Center

    Authors: Sean Oesch, Robert Bridges, Jared Smith, Justin Beaver, John Goodall, Kelly Huffer, Craig Miles, Dan Scofield

    Abstract: Gartner, a large research and advisory company, anticipates that by 2024 80% of security operation centers (SOCs) will use machine learning (ML) based solutions to enhance their operations. In light of such widespread adoption, it is vital for the research community to identify and address usability concerns. This work presents the results of the first in situ usability assessment of ML-based tool… ▽ More

    Submitted 16 December, 2020; originally announced December 2020.

  12. arXiv:1908.03296  [pdf, other

    cs.CR

    That Was Then, This Is Now: A Security Evaluation of Password Generation, Storage, and Autofill in Thirteen Password Managers

    Authors: Sean Oesch, Scott Ruoti

    Abstract: Password managers have the potential to help users more effectively manage their passwords and address many of the concerns surrounding password-based authentication, however prior research has identified significant vulnerabilities in existing password managers. Since that time, five years has passed, leaving it unclear whether password managers remain vulnerable or whether they are now ready for… ▽ More

    Submitted 10 December, 2019; v1 submitted 8 August, 2019; originally announced August 2019.

    Comments: Appearing at USENIX Security 2020