algorithms
Fooling NLP Systems Through Word Swapping
MIT researchers have built a system that fools natural-language processing systems by swapping words with synonyms: The software, developed by a team at MIT, looks for the words in a sentence that ...
Concentric Applies Deep Learning Algorithms to Data Security
Fresh off raising an additional $7 million in funding, Concentric has launched a tool that employs deep learning algorithms to enable cybersecurity teams to identify documents and repositories where sensitive data has ...
Artificial Personas and Public Discourse
Presidential campaign season is officially, officially, upon us now, which means it's time to confront the weird and insidious ways in which technology is warping politics. One of the biggest threats on ...
Manipulating Machine Learning Systems by Manipulating Training Data
Interesting research: "TrojDRL: Trojan Attacks on Deep Reinforcement Learning Agents": Abstract:: Recent work has identified that classification models implemented as neural networks are vulnerable to data-poisoning and Trojan attacks at training time ...
Survey Says Quantum Computing a Cybersecurity Threat
Now that quantum computers are moving from theory into the realm of experimental, many cybersecurity professionals are starting to appreciate a simple fact: Computers capable of cracking the most sophisticated encryption algorithms ...
More Cryptanalysis of Solitaire
In 1999, I invented the Solitaire encryption algorithm, designed to manually encrypt data using a deck of cards. It was written into the plot of Neal Stephenson's novel Cryptonomicon, and I even ...
Data, Surveillance, and the AI Arms Race
According to foreign policy experts and the defense establishment, the United States is caught in an artificial intelligence arms race with China -- one with serious implications for national security. The conventional ...
How Imperva’s New Attack Crowdsourcing Secures Your Business’s Applications
Attacks on applications can be divided into two types: targeted attacks and “spray and pray” attacks. Targeted attacks require planning and usually include a reconnaissance phase, where attackers learn all they can ...
The Time for Passwords Came … and Went
After struggling with every combination of your name and your birth year for the perfect username, you’re probably used to this welcoming you on every website you join: Password must contain: One ...
Evidence for the Security of PKCS #1 Digital Signatures
This is interesting research: "On the Security of the PKCS#1 v1.5 Signature Scheme": Abstract: The RSA PKCS#1 v1.5 signature algorithm is the most widely used digital signature scheme in practice. Its two ...

