Skip to content

Commit

Permalink
update past seminars
Browse files Browse the repository at this point in the history
  • Loading branch information
DaoudiNadia committed Oct 31, 2023
1 parent c50294f commit 1ef913c
Showing 1 changed file with 27 additions and 18 deletions.
45 changes: 27 additions & 18 deletions index.html
Original file line number Diff line number Diff line change
Expand Up @@ -173,23 +173,6 @@ <h2>Upcoming Seminars<h2>
</div>

<div class="event-frame">

<div class="event">
<div class="presenter-details">
<img src="img/yi-hsien.jpg">
<h5> Yi-Hsien Chen</h5>
<p> National Taiwan University</p>
</div>
<div class="event-info">
<h3>Guided Malware Sample Analysis Based on Graph Neural Networks</h3>
<p> Malicious binaries have caused data and monetary loss to people, and these binaries keep evolving rapidly nowadays. While manual analysis is slow and ineffective, automated malware report generation is a long-term goal for malware analysts and researchers. This study moves one step toward the goal by identifying essential functions in malicious binaries to accelerate and even automate the analyzing process. We design and implement an expert system based on our proposed graph neural network called MalwareExpert. The system pinpoints the essential functions of an analyzed sample and visualizes the relationships between involved parts. The evaluation results show that our approach has a competitive detection performance (97.3% accuracy and 96.5% recall rate) compared to existing malware detection models. Moreover, it gives an intuitive and
easy-to-understand explanation of the model predictions by visualizing and correlating essential functions. We compare the identified essential functions reported by our system against several expert-made malware analysis reports from multiple sources. Our qualitative and quantitative analyses show that the pinpointed functions indicate accurate directions. In the best case, the top 2% of functions reported from the system can cover all expert-annotated functions in three steps. We believe that the MalwareExpert system has shed light on automated program behavior analysis.</p>
<p><b><span class="black-underligned">Presentation Date:</span></b> <span class="black"> Monday, October 30th, 2023 at 10:30 AM CET </span></p>
</div>

</div>


<div class="event">
<div class="presenter-details">
<img src="img/ye_he.png">
Expand Down Expand Up @@ -223,6 +206,31 @@ <h2>Past Seminars<h2>

<div class="event-frame">
<ul class="speech-list">
<li>
<div class="speech-header">
<b>Guided Malware Sample Analysis Based on Graph Neural Networks</b>, Monday, October 30th, 2023, by <b>Yi-Hsien Chen</b> from <b>NTU</b>

</div>

<div class="details">
<div class="event">
<div class="presenter-details">
<img src="img/yi-hsien.jpg">
<h5> Yi-Hsien Chen </h5>
<p> National Taiwan University </p>
</div>
<div class="event-info">
<h3>Guided Malware Sample Analysis Based on Graph Neural Networks</h3>
<p> Malicious binaries have caused data and monetary loss to people, and these binaries keep evolving rapidly nowadays. While manual analysis is slow and ineffective, automated malware report generation is a long-term goal for malware analysts and researchers. This study moves one step toward the goal by identifying essential functions in malicious binaries to accelerate and even automate the analyzing process. We design and implement an expert system based on our proposed graph neural network called MalwareExpert. The system pinpoints the essential functions of an analyzed sample and visualizes the relationships between involved parts. The evaluation results show that our approach has a competitive detection performance (97.3% accuracy and 96.5% recall rate) compared to existing malware detection models. Moreover, it gives an intuitive and
easy-to-understand explanation of the model predictions by visualizing and correlating essential functions. We compare the identified essential functions reported by our system against several expert-made malware analysis reports from multiple sources. Our qualitative and quantitative analyses show that the pinpointed functions indicate accurate directions. In the best case, the top 2% of functions reported from the system can cover all expert-annotated functions in three steps. We believe that the MalwareExpert system has shed light on automated program behavior analysis.</p>
<p><b><span class="black-underligned">Presentation Date:</span></b> <span class="black"> Monday, October 30th, 2023 at 10:30 AM CET </span></p>
</div>
</div>
</div>
</li>



<li>
<div class="speech-header">
<b>Rete: Learning Namespace Representation for Program Repair</b>, Monday, October 9th, 2023, by <b>Nikhil Parasaram</b> from <b>UCL</b>
Expand All @@ -232,7 +240,7 @@ <h2>Past Seminars<h2>
<div class="details">
<div class="event">
<div class="presenter-details">
<img src="img/nikhil.jpg" alt="Presenter 1">
<img src="img/nikhil.jpg">
<h5> Nikhil Parasaram</h5>
<p> University College London</p>
</div>
Expand All @@ -246,6 +254,7 @@ <h3>Rete: Learning Namespace Representation for Program Repair</h3>
</div>
</div>
</li>


<!-- Add more speech items as needed -->
</ul>
Expand Down

0 comments on commit 1ef913c

Please sign in to comment.