Toward Autonomy: Symbiotic Formal and Statistical Machine Reasoning

被引:3
作者
Mertoguno, J. Sukarno [1 ]
机构
[1] Georgia Tech Res Inst, Informat & Cyber Sci Directorate, Atlanta, GA USA
来源
2019 IEEE FIRST INTERNATIONAL CONFERENCE ON COGNITIVE MACHINE INTELLIGENCE (COGMI 2019) | 2019年
关键词
Machine Learning; Binary Analysis; Machine Reasoning; Cyber Security; Formal Inference; Statistical Inference;
D O I
10.1109/CogMI48466.2019.00038
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Different types of machine learning, statistical types, where its knowledge in contained in set of numbers, and formal types, where its knowledge is contained in set of rules or statements, have their own strengths and weaknesses. We argue that their strengths and weaknesses are complementary, and develop a concept called Learn2Reason to harness their collective strength, without inheriting their weaknesses. The efficacy of Learn2Reason concept has been successfully demonstrated in software/binary analysis and cyber security areas. Adoption of the concept significantly improve the performance and scalability of software/binary analysis and cyber security applications and tools.
引用
收藏
页码:210 / 215
页数:6
相关论文
共 32 条
  • [1] Superset Disassembly: Statically Rewriting x86 Binaries Without Heuristics
    Bauman, Erick
    Lin, Zhiqiang
    Hamlen, Kevin W.
    [J]. 25TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2018), 2018,
  • [2] Learning Deep Architectures for AI
    Bengio, Yoshua
    [J]. FOUNDATIONS AND TRENDS IN MACHINE LEARNING, 2009, 2 (01): : 1 - 127
  • [3] Carlini N., 2017, ACM WORKSHOP ARTIFIC
  • [4] Towards Evaluating the Robustness of Neural Networks
    Carlini, Nicholas
    Wagner, David
    [J]. 2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2017, : 39 - 57
  • [5] Audio Adversarial Examples: Targeted Attacks on Speech-to-Text
    Carlini, Nicholas
    Wagner, David
    [J]. 2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2018), 2018, : 1 - 7
  • [6] TOSS: Tailoring Online Server Systems through Binary Feature Customization
    Chen, Yurong
    Sun, Shaowen
    Lan, Tian
    Venkataramani, Guru
    [J]. FEAST'18: PROCEEDINGS OF THE 2018 WORKSHOP ON FORMING AN ECOSYSTEM AROUND SOFTWARE TRANSFORMATION, 2018, : 1 - 7
  • [7] Eykholt K, 2018, Arxiv, DOI arXiv:1707.08945
  • [8] Adversarial Examples for Malware Detection
    Grosse, Kathrin
    Papernot, Nicolas
    Manoharan, Praveen
    Backes, Michael
    McDaniel, Patrick
    [J]. COMPUTER SECURITY - ESORICS 2017, PT II, 2017, 10493 : 62 - 79
  • [9] LEAPS: Detecting Camouflaged Attacks with Statistical Learning Guided by Program Analysis
    Gu, Zhongshu
    Pei, Kexin
    Wang, Qifan
    Si, Luo
    Zhang, Xiangyu
    Xu, Dongyan
    [J]. 2015 45TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, 2015, : 57 - 68
  • [10] Hosseini H., 2017, ARXIV