2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/ 12th IEEE International 2018
DOI: 10.1109/trustcom/bigdatase.2018.00172
|View full text |Cite
|
Sign up to set email alerts
|

Enabling Trust in Deep Learning Models: A Digital Forensics Case Study

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 6 publications
0
4
0
Order By: Relevance
“…predictions? These question needs to be answered while designing the application [31]. Hence, there is need of framework which test the security and robustness of these forensic tools.…”
Section: Discussion and Future Workmentioning
confidence: 99%
See 1 more Smart Citation
“…predictions? These question needs to be answered while designing the application [31]. Hence, there is need of framework which test the security and robustness of these forensic tools.…”
Section: Discussion and Future Workmentioning
confidence: 99%
“…It tries to find history of the digital content by recognizing acquisition device that is used to produce the data. It also performs validation of integrity and captured information from multimedia signals [31]. This sub-section concentrates on audio and video forensic.…”
Section: Multimedia Forensicsmentioning
confidence: 99%
“…By employing this technique, it can aid in both anti-crime efforts and swift responses when criminal acts or behaviors are detected. In future endeavors, we aim to establish stronger connections between newly discovered evidence items and existing ones, further strengthening the investigative process [24], [25].…”
Section: Deep Learningmentioning
confidence: 99%
“…The model was made purposely suboptimal (with regular ROC curve far from upper-left corner) in order to better observe the manifestations of the theory. It contains a deep convolutional neural network with {embedding, 4 convolutional, 3 dense, softmax} layers summarized in Appendix A4, trained on half a million raw executable files (originally aggregated from a mix of clean and malicious customer submissions and vendor feeds), XORed with a common byte for inoculation at rest, One of the simplest adversarial attacks for binaries to circumvent malware protection is to append a crafted payload at the end of the file (Kuppa, Grzonkowski, & LeKhac, 2018). These methods can append a binary string, backdoor legitimate files by adding a new section to the executable (either as data or code), or use the resource part of the file when modifying already compiled code.…”
Section: Malware Detection From Raw Bytesmentioning
confidence: 99%