GPT is a powerful text generation model, but its text generation is unconstrained. This session will discuss how to control GPT to produce sentences which meet specific style or content requirements. The session will review approaches that allow attendees to drive GTP to write SPAM and HAM messages and will demonstrate how to convert GPT into a SPAM filter which detects the generated SPAM.
Machine learning (ML) used for static portable executable (PE) malware detection typically employs per-file numerical feature vector representations as input […]
Although powerful for conviction of malicious artifacts, machine learning based detection do not generally produce further information about the type […]
Check out our paper to see how the power of visualization fulfilled the operational needs of our industry research team to detect and resolve the frequently seen issues in our productionized operational security models. We described the full step-by-step design of the user interface and shared the lessons we learned, and demonstrated how we used the system. We added multiple simple views rather than one complex view to support data scientists’ workflow while keeping it simple for high-level users. We focused on finding trends and anomalies in data feeds relevant to the models. A combination of several charts enabled the team to ask questions, verify their hypotheses and generate insights.
Targeted phishing emails are a major cyber threat on the Internet today and are insufficiently addressed by current defenses. In this paper, we leverage industrial-scale datasets from Sophos cloud email security service, which defends tens of millions of customer mailboxes, to propose a novel Transformer-based architecture for detecting targeted phishing emails. Our model leverages both natural language and email header inputs, is more computationally efficient than competing transformer approaches, and we show that it is less prone to adversarial attacks which deliberately replace keywords with typos or synonyms.