We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

AI Village - Machine Learning Security Evasion Competition 2020

Formal Metadata

Title
AI Village - Machine Learning Security Evasion Competition 2020
Title of Series
Number of Parts
374
Author
License
CC Attribution 3.0 Unported:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor.
Identifiers
Publisher
Release Date
Language

Content Metadata

Subject Area
Genre
Abstract
Research attacking ML-based image classifiers is common, but it is less frequent to see a study on how someone can bypass ML-based malware detection. In 2019, we organized a contest where participants had to modify Windows malware in a way where the provided three ML engines do not detect it. However, the modified sample is still functionally equivalent to the original binary. As it turned out, it is not that hard to come up with a generic solution which can bypass all three engine. In this presentation, we will discuss the details of the contest, some of the techniques used by the participants (packing, overlays, adding sections), and we will present the brand new 2020 competition with updated defensive and offensive tracks. The offensive track starts with DEF CON.