Workshop
ICML workshop on Machine Learning for Cybersecurity (ICML-ML4Cyber)
John Emanuello · Andy Applebaum · William Arbaugh · Jack Davidson · Joseph Edappully · H. Howie Huang · Andrew Golczynski · Nicole Nichols · Tejas Patel · Ahmad Ridley · Vance Wong
Room 321 - 323
Fri 22 Jul, 5:45 a.m. PDT
Following a series of crippling cyber-attacks that targeted major of the public and social sectors — including schools, hospitals, critical infrastructure, and private businesses — the global community has increased its attention on the wider societal impacts of major cyber security events, forming task forces like the UN Open Ended Working Group on Cyber Security and undertaking policy efforts to mitigate these impacts. These actions are important, but policy changes only represent one side of the solution. On the other are technical developments, within which machine learning has been proposed as a key component of future of cyber defense tools, requiring rapid development to provide the speed and scale needed to detect and respond to new and emerging cyber security threats. Cybersecurity is inherently a systems problem and piece-wise application of off-the-shelf ML tools leave critical gaps in both sophistication and interpretable context needed for comprehensive security systems. To successfully develop ML-based cybersecurity defenses, a greater degree of cross-pollination across the ML and cybersecurity communities is needed because both are highly specialized technical domains. Moreover, the requisite ML topics needed to successfully leverage ML for cybersecurity — such as time series analytics, game theory, deep learning, reinforcement learning, representation learning, semi-supervised and self-supervised learning, learning on large scale streaming data, interpretable and robust autonomous systems, etc. - are foundational to the ICML community.The primary aim of this workshop is to build a mutual comprehensive awareness of the problem and solution spaces across the greater ML community and the Cybersecurity/ML for Cybersecurity communities. To provide meaningful engagement, workshop organizers will curate a program which defines the interdisciplinary boundary and opportunities between machine learning and cybersecurity.
Schedule
Fri 5:45 a.m. - 6:00 a.m.
|
Welcome/Opening Remarks
(
Remarks
)
>
SlidesLive Video |
Ahmad Ridley 🔗 |
Fri 6:00 a.m. - 7:00 a.m.
|
Artificial Adversarial Intelligence
(
Keynote
)
>
SlidesLive Video |
Una-May O'Reilly 🔗 |
Fri 7:00 a.m. - 7:45 a.m.
|
Cyber 101 for Data Scientists and Mathematicians
(
Invited Talk
)
>
SlidesLive Video |
Emilie Purvine 🔗 |
Fri 7:45 a.m. - 8:00 a.m.
|
Break
|
🔗 |
Fri 8:00 a.m. - 8:25 a.m.
|
Developing Optimal Causal Cyber-Defence Agents via Cyber Security Simulation
(
Oral
)
>
SlidesLive Video |
Alex Andrew · Joshua Collyer · Neil Dhir 🔗 |
Fri 8:25 a.m. - 8:50 a.m.
|
Learning Security Strategies through Game Play and Optimal Stopping
(
Oral
)
>
SlidesLive Video |
Kim Hammar · Rolf Stadler 🔗 |
Fri 8:50 a.m. - 9:15 a.m.
|
Adversarial Cheap Talk
(
Oral
)
>
SlidesLive Video |
Christopher Lu · Timon Willi · Alistair Letcher · Jakob Foerster 🔗 |
Fri 9:15 a.m. - 9:17 a.m.
|
A High Fidelity Cybersecurity Dataset for Attack Modeling
(
Spotlight
)
>
SlidesLive Video |
Craig Laprade · Benjamin Bowman · H. Howie Huang 🔗 |
Fri 9:17 a.m. - 9:19 a.m.
|
Low-Loss Subspace Compression for Clean Gains against Multi-Agent Backdoor Attacks
(
Spotlight
)
>
|
Siddhartha Datta · Nigel Shadbolt 🔗 |
Fri 9:19 a.m. - 9:21 a.m.
|
Robustness Evaluation of Deep Unsupervised Learning Algorithms for Intrusion Detection Systems
(
Spotlight
)
>
|
DJeff KANDA NKASHAMA · Arian Soltani · Jean-Charles Verdier · Marc Frappier · Pierre Martin Tardif · Froduald Kabanza 🔗 |
Fri 9:21 a.m. - 9:23 a.m.
|
Fixed Points in Cyber Space: Rethinking Optimal Evasion Attacks in the Age of AI-NIDS
(
Spotlight
)
>
|
Christian Schroeder · Yongchao Huang · Phil Torr · Martin Strohmeier 🔗 |
Fri 9:23 a.m. - 9:25 a.m.
|
ACD-G: Enhancing Autonomous Cyber Defence Agent Generalisation Through Graph Embedded Network Representation
(
Spotlight
)
>
|
Josh Collyer 🔗 |
Fri 9:25 a.m. - 9:27 a.m.
|
Hypergraph Topological Features for Autoencoder-Based Intrusion Detection for Cybersecurity Data
(
Spotlight
)
>
SlidesLive Video |
11 presentersWilliam Kay · Sinan Aksoy · Molly Baird · Daniel Best · Helen Jenne · Cliff Joslyn · Christopher Potvin · Gregory Henselman-Petrusek · Garret Seppala · Stephen Young · Emilie Purvine |
Fri 9:27 a.m. - 9:29 a.m.
|
Exploiting and Defending Against the Approximate Linearity of Apple’s NeuralHash
(
Spotlight
)
>
SlidesLive Video |
Kevin Meng · Jagdeep S Bhatia 🔗 |
Fri 9:29 a.m. - 9:31 a.m.
|
Reducing Exploitability with Population Based Training
(
Spotlight
)
>
SlidesLive Video |
Pavel Czempin · 🔗 |
Fri 9:31 a.m. - 9:33 a.m.
|
Using Machine Learning to Infer Plausible and Undetected Cyber Threat, Vulnerability and Mitigation Relationships
(
Spotlight
)
>
SlidesLive Video |
Erik Hemberg · Ashwin Srinivasan · Nick Rutar · Una-May O'Reilly 🔗 |
Fri 9:33 a.m. - 9:35 a.m.
|
An Artificial Intelligence-Enabled Framework for Optimizing the Dynamic Cyber Vulnerability Management Process
(
Spotlight
)
>
|
Soumyadeep Hore · Ankit Shah · Nathaniel Bastian 🔗 |
Fri 9:35 a.m. - 10:40 a.m.
|
Break
|
🔗 |
Fri 10:40 a.m. - 10:45 a.m.
|
Afternoon Session Welcome
(
Remarks
)
>
|
John Emanuello 🔗 |
Fri 10:45 a.m. - 11:45 a.m.
|
A Practitioner Perspective on ML for Cybersecurity
(
Keynote
)
>
SlidesLive Video |
Josiah Dykstra 🔗 |
Fri 11:45 a.m. - 12:10 p.m.
|
Detecting Anomalies in Encrypted EV Charging Control Protocol Using a Hybrid LSTM Autoencoder-OCSVM Model
(
Oral
)
>
SlidesLive Video |
Kristine Arthur-Durett · Thomas Carroll · Grace McNally 🔗 |
Fri 12:10 p.m. - 12:35 p.m.
|
CyberEnt: Extracting Domain Specific Entities from Cybersecurity Text
(
Oral
)
>
SlidesLive Video |
Casey Hanks · Michael Maiden · Priyanka Ranade · Tim Finin · Anupam Joshi 🔗 |
Fri 12:35 p.m. - 1:00 p.m.
|
Break
|
🔗 |
Fri 1:00 p.m. - 2:00 p.m.
|
Benchmark Data Sets
(
Panel
)
>
|
Vance Wong · Hyrum Anderson · Jamie Thorpe · Jeffrey A. Nichols · Benoit Hamelin · Jelena Mirkovic 🔗 |
Fri 1:00 p.m. - 1:10 p.m.
|
Benchmark Data Sets Panel- Prerecorded Remarks (Backup)
(
Panel Remarks (Backup)
)
>
SlidesLive Video |
Benoit Hamelin 🔗 |
Fri 1:10 p.m. - 1:20 p.m.
|
Benchmark Data Sets Panel- Prerecorded Remarks (Backup)
(
Panel Remarks (Backup)
)
>
SlidesLive Video |
Hyrum Anderson 🔗 |
Fri 1:20 p.m. - 1:30 p.m.
|
Benchmark Data Sets Panel- Prerecorded Remarks (Backup)
(
Panel Remarks (Backup)
)
>
SlidesLive Video |
Jeffrey A. Nichols 🔗 |
Fri 1:30 p.m. - 1:40 p.m.
|
Benchmark Data Sets Panel- Prerecorded Remarks (Backup)
(
Panel Remarks (Backup)
)
>
SlidesLive Video |
Jamie Thorpe 🔗 |
Fri 1:40 p.m. - 1:50 p.m.
|
Benchmark Data Sets Panel- Prerecorded Remarks (Backup)
(
Panel Remarks (Backup)
)
>
SlidesLive Video |
Jelena Mirkovic 🔗 |
Fri 2:00 p.m. - 2:30 p.m.
|
A Case Study of Real-World Kernel Exploitation
(
Invited Talk
)
>
SlidesLive Video |
Michael Wang · Joseph Ravichandran 🔗 |
Fri 2:30 p.m. - 3:15 p.m.
|
A High Fidelity Cybersecurity Dataset for Attack Modeling
(
Poster
)
>
|
Craig Laprade · Benjamin Bowman · H. Howie Huang 🔗 |
Fri 2:30 p.m. - 3:15 p.m.
|
Low-Loss Subspace Compression for Clean Gains against Multi-Agent Backdoor Attacks
(
Poster
)
>
SlidesLive Video |
Siddhartha Datta · Nigel Shadbolt 🔗 |
Fri 2:30 p.m. - 3:15 p.m.
|
Robustness Evaluation of Deep Unsupervised Learning Algorithms for Intrusion Detection Systems
(
Poster
)
>
SlidesLive Video |
DJeff KANDA NKASHAMA · Arian Soltani · Jean-Charles Verdier · Marc Frappier · Pierre Martin Tardif · Froduald Kabanza 🔗 |
Fri 2:30 p.m. - 3:15 p.m.
|
Fixed Points in Cyber Space: Rethinking Optimal Evasion Attacks in the Age of AI-NIDS
(
Poster
)
>
|
Christian Schroeder · Yongchao Huang · Phil Torr · Martin Strohmeier 🔗 |
Fri 2:30 p.m. - 3:15 p.m.
|
ACD-G: Enhancing Autonomous Cyber Defence Agent Generalisation Through Graph Embedded Network Representation
(
Poster
)
>
SlidesLive Video |
Josh Collyer 🔗 |
Fri 2:30 p.m. - 3:15 p.m.
|
Hypergraph Topological Features for Autoencoder-Based Intrusion Detection for Cybersecurity Data
(
Poster
)
>
|
11 presentersWilliam Kay · Sinan Aksoy · Molly Baird · Daniel Best · Helen Jenne · Cliff Joslyn · Christopher Potvin · Gregory Henselman-Petrusek · Garret Seppala · Stephen Young · Emilie Purvine |
Fri 2:30 p.m. - 3:15 p.m.
|
Exploiting and Defending Against the Approximate Linearity of Apple’s NeuralHash
(
Poster
)
>
|
Kevin Meng · Jagdeep S Bhatia 🔗 |
Fri 2:30 p.m. - 3:15 p.m.
|
Reducing Exploitability with Population Based Training
(
Poster
)
>
SlidesLive Video |
Pavel Czempin · 🔗 |
Fri 2:30 p.m. - 3:15 p.m.
|
Using Machine Learning to Infer Plausible and Undetected Cyber Threat, Vulnerability and Mitigation Relationships
(
Poster
)
>
SlidesLive Video |
Erik Hemberg · Ashwin Srinivasan · Nick Rutar · Una-May O'Reilly 🔗 |
Fri 2:30 p.m. - 3:15 p.m.
|
An Artificial Intelligence-Enabled Framework for Optimizing the Dynamic Cyber Vulnerability Management Process
(
Poster
)
>
SlidesLive Video |
Soumyadeep Hore · Ankit Shah · Nathaniel Bastian 🔗 |
Fri 3:15 p.m. - 3:30 p.m.
|
Closing Remarks
(
Remarks
)
>
|
Ahmad Ridley 🔗 |