221 research outputs found
On Security and Sparsity of Linear Classifiers for Adversarial Settings
Machine-learning techniques are widely used in security-related applications,
like spam and malware detection. However, in such settings, they have been
shown to be vulnerable to adversarial attacks, including the deliberate
manipulation of data at test time to evade detection. In this work, we focus on
the vulnerability of linear classifiers to evasion attacks. This can be
considered a relevant problem, as linear classifiers have been increasingly
used in embedded systems and mobile devices for their low processing time and
memory requirements. We exploit recent findings in robust optimization to
investigate the link between regularization and security of linear classifiers,
depending on the type of attack. We also analyze the relationship between the
sparsity of feature weights, which is desirable for reducing processing cost,
and the security of linear classifiers. We further propose a novel octagonal
regularizer that allows us to achieve a proper trade-off between them. Finally,
we empirically show how this regularizer can improve classifier security and
sparsity in real-world application examples including spam and malware
detection
Elemental Abundance Ratios in Stars of the Outer Galactic Disk. IV. A New Sample of Open Clusters
We present radial velocities and chemical abundances for nine stars in the
old, distant open clusters Be 18, Be 21, Be 22, Be 32, and PWM 4. For Be 18 and
PWM 4, these are the first chemical abundance measurements. Combining our data
with literature results produces a compilation of some 68 chemical abundance
measurements in 49 unique clusters. For this combined sample, we study the
chemical abundances of open clusters as a function of distance, age, and
metallicity. We confirm that the metallicity gradient in the outer disk is
flatter than the gradient in the vicinity of the solar neighborhood. We also
confirm that the open clusters in the outer disk are metal-poor with
enhancements in the ratios [alpha/Fe] and perhaps [Eu/Fe]. All elements show
negligible or small trends between [X/Fe] and distance (< 0.02 dex/kpc), but
for some elements, there is a hint that the local (RGC < 13 kpc) and distant
(RGC > 13 kpc) samples may have different trends with distance. There is no
evidence for significant abundance trends versus age (< 0.04 dex/Gyr). We
measure the linear relation between [X/Fe] and metallicity, [Fe/H], and find
that the scatter about the mean trend is comparable to the measurement
uncertainties. Comparison with solar neighborhood field giants shows that the
open clusters share similar abundance ratios [X/Fe] at a given metallicity.
While the flattening of the metallicity gradient and enhanced [alpha/Fe] ratios
in the outer disk suggest a different chemical enrichment history to the solar
neighborhood, we echo the sentiments expressed by Friel et al. that definitive
conclusions await homogeneous analyses of larger samples of stars in larger
numbers of clusters. Arguably, our understanding of the evolution of the outer
disk from open clusters is currently limited by systematic abundance
differences between various studies.Comment: Accepted for publication in A
The Gaia-ESO Survey: the most metal-poor stars in the Galactic bulge
We present the first results of the EMBLA survey (Extremely Metal-poor BuLge
stars with AAOmega), aimed at finding metal-poor stars in the Milky Way bulge,
where the oldest stars should now preferentially reside. EMBLA utilises
SkyMapper photometry to pre-select metal-poor candidates, which are
subsequently confirmed using AAOmega spectroscopy. We describe the discovery
and analysis of four bulge giants with -2.72<=[Fe/H]<=-2.48, the lowest
metallicity bulge stars studied with high-resolution spectroscopy to date.
Using FLAMES/UVES spectra through the Gaia-ESO Survey we have derived
abundances of twelve elements. Given the uncertainties, we find a chemical
similarity between these bulge stars and halo stars of the same metallicity,
although the abundance scatter may be larger, with some of the stars showing
unusual [{\alpha}/Fe] ratios.Comment: 7 pages, 5 figures. Accepted for publication by MNRA
The Gaia-ESO Survey: the chemical structure of the Galactic discs from the first internal data release
Most high-resolution spectroscopic studies of the Galactic discs were mostly
confined to objects in the solar vicinity. Here we aim at enlarging the volume
in which individual chemical abundances are used to characterise both discs,
using the first internal data release of the Gaia-ESO survey. We derive and
discuss the abundances of eight elements (Mg, Al, Si, Ca, Ti, Fe, Cr, Ni, and
Y). The trends of these elemental abundances with iron are very similar to
those in the solar neighbourhood. We find a natural division between alpha-rich
and alpha-poor stars, best seen in the bimodality of the [Mg/M] distributions
in bins of metallicity, which we attribute to thick- and thin-disc sequences,
respectively. With the possible exception of Al, the observed dispersion around
the trends is well described by the expected errors, leaving little room for
astrophysical dispersion. Using previously derived distances from Recio-Blanco
et al. (2014b), we further find that the thick-disc is more extended vertically
and is more centrally concentrated towards the inner Galaxy than the thin-disc,
which indicates a shorter scale-length. We derive the radial and vertical
gradients in metallicity, iron, four alpha-element abundances, and Al for the
two populations, taking into account the identified correlation between R_GC
and |Z|. Radial metallicity gradient is found in the thin disc. The positive
radial individual [alpha/M] gradients found are at variance from the gradients
observed in the RAVE survey. The thin disc also hosts a negative vertical
metallicity gradient, accompanied by positive individual [alpha/M] and [Al/M]
gradients. The thick-disc, presents no radial metallicity gradient, a shallower
vertical metallicity gradient than the thin-disc, an alpha-elements-to-iron
radial gradient in the opposite sense than that of the thin disc, and positive
vertical individual [alpha/M] and [Al/M] gradients.Comment: 24 pages, 10 figure
Open clusters towards the Galactic center: chemistry and dynamics. A VLT spectroscopic study of NGC6192, NGC6404, NGC6583
In the framework of the study of the Galactic metallicity gradient and its
time evolution, we present new high-resolution spectroscopic observations
obtained with FLAMES and the fiber link to UVES at VLT of three open clusters
(OCs) located within 7~kpc from the Galactic Center (GC): NGC~6192,
NGC~6404, NGC~6583. We also present new orbit determination for all OCs with
Galactocentric distances (R8~kpc and metallicity from
high-resolution spectroscopy. We aim to investigate the slope of the inner disk
metallicity gradient as traced by OCs and at discussing its implication on the
chemical evolution of our Galaxy. We have derived memberships of a group of
evolved stars for each clusters, obtaining a sample of 4, 4, and 2 member stars
in NGC~6192, NGC~6404, and NGC~6583, respectively. Using standard LTE analysis
we derived stellar parameters and abundance ratios for the iron-peak elements
Fe, Ni, Cr, and for the -elements Al, Mg, Si, Ti, Ca. We calculated the
orbits of the OCs currently located within 8~kpc from the GC, and discuss their
implication on the present-time radial location. {The average metallicities of
the three clusters are all oversolar: [Fe/H]= (NGC~6192),
(NGC 6404), (NGC 6583). They are in qualitative
agreement with their Galactocentric distances, being all internal OCs, and thus
expected to be metal richer than the solar neighborhood. The abundance ratios
of the other elements over iron [X/Fe] are consistent with solar values. The
clusters we have analysed, together with other OC and Cepheid data, confirm a
steep gradient in the inner disk, a signature of an evolutionary rate different
than in the outer disk.Comment: 17 pages, 13 figures, A&A accepted for publicatio
The Gaia-ESO Survey: Chromospheric Emission, Accretion Properties, and Rotation in Velorum and Chamaeleon I
We use the fundamental parameters delivered by the GES consortium in the
first internal data release to select the members of Vel and Cha I
among the UVES and GIRAFFE spectroscopic observations. A total of 140
Vel members and 74 Cha I members were studied. We calculated stellar
luminosities through spectral energy distributions, while stellar masses were
derived by comparison with evolutionary tracks. The spectral subtraction of
low-activity and slowly rotating templates, which are rotationally broadened to
match the of the targets, enabled us to measure the equivalent widths
(EWs) and the fluxes in the H and H lines. The H line
was also used for identifying accreting objects and for evaluating the mass
accretion rate (). The distribution of for the
members of Vel displays a peak at about 10 km s with a tail
toward faster rotators. There is also some indication of a different
distribution for the members of its two kinematical populations. Only a handful
of stars in Vel display signatures of accretion, while many more
accretors were detected in the younger Cha~I. Accreting and active stars occupy
two different regions in a -flux diagram and we propose a
criterion for distinguishing them. We derive in the ranges
-yr and -yr
for Vel and Cha I accretors, respectively. We find less scatter in the
relation derived through the H EWs, when
compared to the H diagnostics, in agreement with other authors
A risk estimation study of native code vulnerabilities in Android applications
Android is the most used operating system (OS) worldwide for mobile devices, with hundreds of thousands of apps downloaded daily. Although these apps are primarily written in Java and Kotlin, advanced functionalities such as graphics or cryptography are provided through native C/C++ libraries. These libraries can be affected by common vulnerabilities in C/C++ code (e.g. memory errors such as buffer overflow), through which attackers can read/modify data or execute arbitrary code. The detection and assessment of vulnerabilities in Android native code have only been recently explored by previous research work. In this paper, we propose a fast risk-based approach that provides a risk score related to the native part of an Android application. In this way, before an app is released, the developer can check whether the app may contain vulnerabilities in the native code and, whether present, patch them to publish a more secure application. To this end, we first use fast regular expressions to detect library versions and possible vulnerable functions. Then, we apply scores extracted from a vulnerability database to the analyzed application, thus obtaining a risk score representative of the whole app. We demonstrate the validity of our approach by performing a large-scale analysis on more than 100 000 applications (but only 40% contained native code) and 15 popular libraries carrying known vulnerabilities. The attained results show that many applications contain well-known vulnerabilities that miscreants can potentially exploit, posing serious concerns about the security of the whole Android applications landscape
Adversarial detection of Flash Malware: limitations and Open issues
During the past four years, Flash malware has become one of the most insidious threats to detect, with almost 600 critical vulnerabilities targeting Adobe Flash Player disclosed in the wild. Research has shown that machine learning can be successfully used to detect Flash malware by leveraging static analysis to extract information from the structure of the file or its bytecode. However, the robustness of Flash malware detectors against well-crafted evasion attempts - also known as adversarial examples - has never been investigated. In this paper, we propose a security evaluation of a novel, representative Flash detector that embeds a combination of the prominent, static features employed by state-of-the-art tools. In particular, we discuss how to craft adversarial Flash malware examples, showing that it suffices to manipulate the corresponding source malware samples slightly to evade detection. We then empirically demonstrate that popular defense techniques proposed to mitigate evasion attempts, including re-training on adversarial examples, may not always be sufficient to ensure robustness. We argue that this occurs when the feature vectors extracted from adversarial examples become indistinguishable from those of benign data, meaning that the given feature representation is intrinsically vulnerable. In this respect, we are the first to formally define and quantitatively characterize this vulnerability, highlighting when an attack can be countered by solely improving the security of the learning algorithm, or when it requires also considering additional features. We conclude the paper by suggesting alternative research directions to improve the security of learning-based Flash malware detectors
Do gradient-based explanations tell anything about adversarial robustness to android malware?
While machine-learning algorithms have demonstrated a strong ability in detecting Android malware, they can be evaded by sparse evasion attacks crafted by injecting a small set of fake components, e.g., permissions and system calls, without compromising intrusive functionality. Previous work has shown that, to improve robustness against such attacks, learning algorithms should avoid overemphasizing few discriminant features, providing instead decisions that rely upon a large subset of components. In this work, we investigate whether gradient-based attribution methods, used to explain classifiers’ decisions by identifying the most relevant features, can be used to help identify and select more robust algorithms. To this end, we propose to exploit two different metrics that represent the evenness of explanations, and a new compact security measure called Adversarial Robustness Metric. Our experiments conducted on two different datasets and five classification algorithms for Android malware detection show that a strong connection exists between the uniformity of explanations and adversarial robustness. In particular, we found that popular techniques like Gradient*Input and Integrated Gradients are strongly correlated to security when applied to both linear and nonlinear detectors, while more elementary explanation techniques like the simple Gradient do not provide reliable information about the robustness of such classifiers
The Gaia-ESO Survey: Chromospheric Emission, Accretion Properties, and Rotation in Velorum and Chamaeleon I
We use the fundamental parameters delivered by the GES consortium in the first internal data release to select the members of Vel and Cha I among the UVES and GIRAFFE spectroscopic observations. A total of 140 Vel members and 74 Cha I members were studied. We calculated stellar luminosities through spectral energy distributions, while stellar masses were derived by comparison with evolutionary tracks. The spectral subtraction of low-activity and slowly rotating templates, which are rotationally broadened to match the of the targets, enabled us to measure the equivalent widths (EWs) and the fluxes in the H and H lines. The H line was also used for identifying accreting objects and for evaluating the mass accretion rate (). The distribution of for the members of Vel displays a peak at about 10 km s with a tail toward faster rotators. There is also some indication of a different distribution for the members of its two kinematical populations. Only a handful of stars in Vel display signatures of accretion, while many more accretors were detected in the younger Cha~I. Accreting and active stars occupy two different regions in a -flux diagram and we propose a criterion for distinguishing them. We derive in the ranges -yr and -yr for Vel and Cha I accretors, respectively. We find less scatter in the relation derived through the H EWs, when compared to the H diagnostics, in agreement with other authors
- …
