Friday, February 3, 2023
  • About us
    • Write for us
    • Disclaimer
    • Terms of use
    • Privacy Policy
  • RSS Feeds
  • Advertise with us
  • Contact us
DefenceTalk
  • Home
  • Defense News
    • Defense & Geopolitics News
    • War Conflicts News
    • Army News
    • Air Force News
    • Navy News
    • Missiles Systems News
    • Nuclear Weapons
    • Defense Technology
    • Cybersecurity News
  • Military Photos
  • Defense Forum
  • Military Videos
  • Military Weapon Systems
    • Weapon Systems
    • Reports
No Result
View All Result
  • Home
  • Defense News
    • Defense & Geopolitics News
    • War Conflicts News
    • Army News
    • Air Force News
    • Navy News
    • Missiles Systems News
    • Nuclear Weapons
    • Defense Technology
    • Cybersecurity News
  • Military Photos
  • Defense Forum
  • Military Videos
  • Military Weapon Systems
    • Weapon Systems
    • Reports
No Result
View All Result
DefenceTalk
No Result
View All Result

Malicious coders will lose anonymity as identity-finding research matures

by Army News Service
January 18, 2016
in Technology News
2 min read
0
Malicious coders will lose anonymity as identity-finding research matures

U.S. Army Research Laboratory network security and academic researchers are in search of a tool kit that may one day help analysts to identify malware authors more quickly.

14
VIEWS

Literature critics may know a writer by his style, in the same way a chunk of computer code is identified through a machine learning algorithm according to its writer’s nuances.

Writing style extends beyond prose, so that even in computer languages you could attribute work to its author in minutes with near perfect accuracy – in a lab.

That is what a team of university students tested during their time at the U.S. Army Research Laboratory, or ARL, said Richard Harang, ARL network security researcher and technical lead. “A tool kit that may one day help analysts to identify malware authors more quickly.”

The code stylometry study that was presented by Aylin Caliskan-Islam at the 32nd Chaos Computer Conference looked at samples from 1,600 coders and, with 94 percent accuracy, could determine the author of a particular code excerpt. In a “top five suspects” match, the precision was near perfect.

The research also examined executable binary authorship attribution from the standpoint of machine learning, using a novel set of features that include ones obtained by decompiling the executable binary to source code, showing that many features in source code could be extracted from decompiled executable binary, according to their recent paper, When coding style survives compilation: De-anonymizing programmers from executable binaries.

The team, including Caliskan-Islam, a Princeton University post-doctoral candidate, who started working on the project as a graduate student; Fabian Yamaguchi, from the University of Gottingen; and Edwin Dauber from Drexel University, is trying to address the problem of identifying the author of malicious code and software.

The next step in this fundamental research will be to extend the current result to more flexible working conditions.

“Attribution is a real challenge [as opposed to detection], as it is done manually by experts who have to reconcile forensics following an attack,” Harang said. “Currently, human analysis is the common tool. It works, but it can be slow and take a lot of resources. We are developing a toolkit to make it a lot faster and cheaper to support analysts in identifying bad actors.”

A limitation is that success is dependent upon having existing samples from potential authors. Another challenge for the future is to consider the tricks used by malware authors to heavily obfuscate, or mask, the software, as well as to extend the experiments to code written by multiple authors.

The goal for ARL is to develop basic and applied science and tools to defend Army networks, said Jerry Clarke, chief of ARL’s Network Security Branch.

This is fast-moving research and the study is making strides, Harang said.

They have demonstrated that authorship attribution can be performed on real-world code found “in the wild” by performing attribution on single-author GitHub repositories, according to the findings.

“This basic research shows that identifying authors of computer programs based on coding style is possible and worth pursuing,” Harang said. “This is collaborative research that builds upon a lot of good work before us.”

Professor Rachel Greenstadt at Drexel has been very active in this research, as well as contributions from Professor Arvind Narayanan at Princeton and Professor Konrad Rieck from the University of Gottingen.

“We have a novel technique that moves the ball forward. But there is work to be done.”

Tags: coderscyber warfareidentityMalwareus army
Previous Post

Fierce clashes as regime battles IS in Aleppo: monitor

Next Post

Skjold-class Missile Corvette

Related Posts

If US DoD Wants #ArtificialIntelligence In Its Future, It Must Start Now

AI voice tool ‘misused’ as deepfakes flood web forum

February 1, 2023

A British AI firm said it was rethinking its "safeguards" after its audio tool was used to clone celebrity voices...

Hackers could shut down satellites – or turn them into weapons

Airbus to provide satellite communications for Belgian Armed Forces

January 25, 2023

Airbus has signed a contract with the Belgian Ministry of Defence to provide tactical satellite communications services for a 15...

Next Post
Skjold-class Missile Corvette

Skjold-class Missile Corvette

Latest Defense News

Beijing accuses NATO of exaggerating ‘China threat theory’

Majority of Finns want to join NATO before Sweden: poll

February 3, 2023
China, US defence ministers to hold talks in Singapore

Pentagon tracking Chinese spy balloon over US

February 3, 2023
Eurofighter Touts Typhoon Capabilities to Poland At Air Show

UK court examines legality of resuming Saudi arms sales

February 1, 2023
If US DoD Wants #ArtificialIntelligence In Its Future, It Must Start Now

AI voice tool ‘misused’ as deepfakes flood web forum

February 1, 2023
Japan defence ministry seeks $50 billion budget

NATO chief hails Japan plans to expand defence spending

February 1, 2023
Indonesia Orders Additional CAESAR Artillery Systems

France to send more mobile artillery to Ukraine

February 1, 2023

Defense Forum Discussions

  • ADF General discussion thread
  • Russia and the West
  • Middle East Defence & Security
  • Military Aviation News and Discussion
  • NZDF General discussion thread
  • PRC Peoples Liberation Army Navy
  • Royal Australian Navy Discussions and Updates 2.0
  • The Russian-Ukrainian War Thread
  • Indonesian Aero News
  • Why ASEAN matters - in the era of great power competition
DefenceTalk

© 2003-2020 DefenceTalk.com

Navigate Site

  • Defence Forum
  • Military Photos
  • RSS Feeds
  • About us
  • Advertise with us
  • Contact us

Follow Us

No Result
View All Result
  • Home
  • Defense News
    • Defense & Geopolitics News
    • War Conflicts News
    • Army News
    • Air Force News
    • Navy News
    • Missiles Systems News
    • Nuclear Weapons
    • Defense Technology
    • Cybersecurity News
  • Military Photos
  • Defense Forum
  • Military Videos
  • Military Weapon Systems
    • Weapon Systems
    • Reports

© 2003-2020 DefenceTalk.com