Skip to main content

Showing 1–13 of 13 results for author: Stokes, J W

  1. arXiv:2403.12388  [pdf, other

    cs.IR cs.AI

    Interpretable User Satisfaction Estimation for Conversational Systems with Large Language Models

    Authors: Ying-Chun Lin, Jennifer Neville, Jack W. Stokes, Longqi Yang, Tara Safavi, Mengting Wan, Scott Counts, Siddharth Suri, Reid Andersen, Xiaofeng Xu, Deepak Gupta, Sujay Kumar Jauhar, Xia Song, Georg Buscher, Saurabh Tiwary, Brent Hecht, Jaime Teevan

    Abstract: Accurate and interpretable user satisfaction estimation (USE) is critical for understanding, evaluating, and continuously improving conversational systems. Users express their satisfaction or dissatisfaction with diverse conversational patterns in both general-purpose (ChatGPT and Bing Copilot) and task-oriented (customer service chatbot) conversational systems. Existing approaches based on featur… ▽ More

    Submitted 8 June, 2024; v1 submitted 18 March, 2024; originally announced March 2024.

  2. arXiv:2403.01038  [pdf, other

    cs.CR cs.AI

    AutoAttacker: A Large Language Model Guided System to Implement Automatic Cyber-attacks

    Authors: Jiacen Xu, Jack W. Stokes, Geoff McDonald, Xuesong Bai, David Marshall, Siyue Wang, Adith Swaminathan, Zhou Li

    Abstract: Large language models (LLMs) have demonstrated impressive results on natural language tasks, and security researchers are beginning to employ them in both offensive and defensive systems. In cyber-security, there have been multiple research efforts that utilize LLMs focusing on the pre-breach stage of attacks like phishing and malware generation. However, so far there lacks a comprehensive study r… ▽ More

    Submitted 1 March, 2024; originally announced March 2024.

  3. arXiv:2402.13496  [pdf, other

    cs.LG cs.SI

    HetTree: Heterogeneous Tree Graph Neural Network

    Authors: Mingyu Guan, Jack W. Stokes, Qinlong Luo, Fuchen Liu, Purvanshi Mehta, Elnaz Nouri, Taesoo Kim

    Abstract: The recent past has seen an increasing interest in Heterogeneous Graph Neural Networks (HGNNs) since many real-world graphs are heterogeneous in nature, from citation graphs to email graphs. However, existing methods ignore a tree hierarchy among metapaths, which is naturally constituted by different node types and relation types. In this paper, we present HetTree, a novel heterogeneous tree graph… ▽ More

    Submitted 20 February, 2024; originally announced February 2024.

  4. arXiv:2205.14759  [pdf, other

    cs.CR cs.LG

    Radial Spike and Slab Bayesian Neural Networks for Sparse Data in Ransomware Attacks

    Authors: Jurijs Nazarovs, Jack W. Stokes, Melissa Turcotte, Justin Carroll, Itai Grady

    Abstract: Ransomware attacks are increasing at an alarming rate, leading to large financial losses, unrecoverable encrypted data, data leakage, and privacy concerns. The prompt detection of ransomware attacks is required to minimize further damage, particularly during the encryption stage. However, the frequency and structure of the observed ransomware attack data makes this task difficult to accomplish in… ▽ More

    Submitted 29 May, 2022; originally announced May 2022.

  5. Living-Off-The-Land Command Detection Using Active Learning

    Authors: Talha Ongun, Jack W. Stokes, Jonathan Bar Or, Ke Tian, Farid Tajaddodianfar, Joshua Neil, Christian Seifert, Alina Oprea, John C. Platt

    Abstract: In recent years, enterprises have been targeted by advanced adversaries who leverage creative ways to infiltrate their systems and move laterally to gain access to critical data. One increasingly common evasive method is to hide the malicious activity behind a benign program by using tools that are already installed on user computers. These programs are usually part of the operating system distrib… ▽ More

    Submitted 29 November, 2021; originally announced November 2021.

    Comments: 14 pages, published in RAID 2021

  6. arXiv:2106.05256  [pdf, other

    cs.CR

    URLTran: Improving Phishing URL Detection Using Transformers

    Authors: Pranav Maneriker, Jack W. Stokes, Edir Garcia Lazo, Diana Carutasu, Farid Tajaddodianfar, Arun Gururajan

    Abstract: Browsers often include security features to detect phishing web pages. In the past, some browsers evaluated an unknown URL for inclusion in a list of known phishing pages. However, as the number of URLs and known phishing pages continued to increase at a rapid pace, browsers started to include one or more machine learning classifiers as part of their security services that aim to better protect en… ▽ More

    Submitted 27 August, 2021; v1 submitted 9 June, 2021; originally announced June 2021.

  7. arXiv:2105.10051  [pdf, other

    cs.CR

    Preventing Machine Learning Poisoning Attacks Using Authentication and Provenance

    Authors: Jack W. Stokes, Paul England, Kevin Kane

    Abstract: Recent research has successfully demonstrated new types of data poisoning attacks. To address this problem, some researchers have proposed both offline and online data poisoning detection defenses which employ machine learning algorithms to identify such attacks. In this work, we take a different approach to preventing data poisoning attacks which relies on cryptographically-based authentication a… ▽ More

    Submitted 20 May, 2021; originally announced May 2021.

  8. arXiv:2010.00544  [pdf, other

    cs.HC cs.CR cs.CY

    Designing Indicators to Combat Fake Media

    Authors: Imani N. Sherman, Elissa M. Redmiles, Jack W. Stokes

    Abstract: The growth of misinformation technology necessitates the need to identify fake videos. One approach to preventing the consumption of these fake videos is provenance which allows the user to authenticate media content to its original source. This research designs and investigates the use of provenance indicators to help users identify fake videos. We first interview users regarding their experience… ▽ More

    Submitted 1 October, 2020; originally announced October 2020.

    Comments: 26 pages, 12 figures

  9. arXiv:2001.07886  [pdf, other

    cs.MM cs.CR eess.SY

    AMP: Authentication of Media via Provenance

    Authors: Paul England, Henrique S. Malvar, Eric Horvitz, Jack W. Stokes, Cédric Fournet, Rebecca Burke-Aguero, Amaury Chamayou, Sylvan Clebsch, Manuel Costa, John Deutscher, Shabnam Erfani, Matt Gaylor, Andrew Jenks, Kevin Kane, Elissa Redmiles, Alex Shamis, Isha Sharma, Sam Wenker, Anika Zaman

    Abstract: Advances in graphics and machine learning have led to the general availability of easy-to-use tools for modifying and synthesizing media. The proliferation of these tools threatens to cast doubt on the veracity of all media. One approach to thwarting the flow of fake media is to detect modified or synthesized media through machine learning methods. While detection may help in the short term, we be… ▽ More

    Submitted 20 June, 2020; v1 submitted 22 January, 2020; originally announced January 2020.

    Comments: Add detailed manifest description, Add provenance, Improve text

  10. arXiv:1904.01126  [pdf, other

    cs.CR cs.AI cs.LG

    ScriptNet: Neural Static Analysis for Malicious JavaScript Detection

    Authors: Jack W. Stokes, Rakshit Agrawal, Geoff McDonald, Matthew Hausknecht

    Abstract: Malicious scripts are an important computer infection threat vector in the wild. For web-scale processing, static analysis offers substantial computing efficiencies. We propose the ScriptNet system for neural malicious JavaScript detection which is based on static analysis. We use the Convoluted Partitioning of Long Sequences (CPoLS) model, which processes Javascript files as byte sequences. Lower… ▽ More

    Submitted 1 April, 2019; originally announced April 2019.

  11. arXiv:1806.10741  [pdf, other

    cs.AI cs.CR cs.LG

    Robust Neural Malware Detection Models for Emulation Sequence Learning

    Authors: Rakshit Agrawal, Jack W. Stokes, Mady Marinescu, Karthik Selvaraj

    Abstract: Malicious software, or malware, presents a continuously evolving challenge in computer security. These embedded snippets of code in the form of malicious files or hidden within legitimate files cause a major risk to systems with their ability to run malicious command sequences. Malware authors even use polymorphism to reorder these commands and create several malicious variations. However, if exec… ▽ More

    Submitted 27 June, 2018; originally announced June 2018.

  12. arXiv:1805.05603  [pdf, other

    cs.CR cs.AI

    Neural Classification of Malicious Scripts: A study with JavaScript and VBScript

    Authors: Jack W. Stokes, Rakshit Agrawal, Geoff McDonald

    Abstract: Malicious scripts are an important computer infection threat vector. Our analysis reveals that the two most prevalent types of malicious scripts include JavaScript and VBScript. The percentage of detected JavaScript attacks are on the rise. To address these threats, we investigate two deep recurrent models, LaMP (LSTM and Max Pooling) and CPoLS (Convoluted Partitioning of Long Sequences), which pr… ▽ More

    Submitted 15 May, 2018; originally announced May 2018.

  13. arXiv:1712.05919  [pdf, other

    cs.CR

    Attack and Defense of Dynamic Analysis-Based, Adversarial Neural Malware Classification Models

    Authors: Jack W. Stokes, De Wang, Mady Marinescu, Marc Marino, Brian Bussone

    Abstract: Recently researchers have proposed using deep learning-based systems for malware detection. Unfortunately, all deep learning classification systems are vulnerable to adversarial attacks. Previous work has studied adversarial attacks against static analysis-based malware classifiers which only classify the content of the unknown file without execution. However, since the majority of malware is eith… ▽ More

    Submitted 16 December, 2017; originally announced December 2017.