Ph.D. candidate, University of Manitoba
Identify dynamic semantics to detect mutant malware using human cognitive analysis
Malware are an evolving threats to any computing system connected to the internet and cloud e.g. computers, smart phones, servers. My research is focused on developing novel cognitive semantic to detect evolving cyber threats which are not known apriori. Through my doctoral research, I have discovered that state of the art cyber threats are very complex to the order that existing malware detection techniques are failing as tested on my malware sandbox. However, using a novel multiscale and multifractal approach, I am able to detect these advanced threats reliably. I have more than 12 research publications in this area. In total, I have more 25 publications from the platform of University of Manitoba.
Abstract: A machine-learning engine is disclosed that is configured to recognize and learn behaviors, as well as to identify and distinguish between normal and abnormal behavior within a scene, by analyzing movements and/or activities (or absence of such) over time. The machine-learning engine may be configured to evaluate a sequence of primitive events and associated kinematic data generated for an object depicted in a sequence of video frames and a related vector representation. The vector representation is generated from a primitive event symbol stream and a phase space symbol stream, and the streams describe actions of the objects depicted in the sequence of video frames.
Pub.: 08 Nov '16, Pinned: 08 Jul '17
Abstract: A software development system (SDS) (228) digitally signs software (230) developed on the system. The SDS (228) executes on a computer system (112) having a trusted computing platform. The platform includes protected areas (220, 226) that store data and cannot be accessed by unauthorized modules. A code signing module (232) executing in a protected area (226) obtains a private/public key pair and a corresponding digital certificate. The SDS (228) is configured to automatically and transparently utilize the code signing module (232) to sign software (230) produced by the system. End-user systems (114) receive the certificate with the software and can use it to verify the signature. This verification will fail if a parasitic virus or other malicious code has altered the software (230). Accordingly, the SDS (228) greatly reduces the risk of malicious code executing on the end-user computer system (114).
Pub.: 06 Apr '10, Pinned: 08 Jul '17
Abstract: The fermi paradox uses an appeal to the mediocrity principle to make it seem counter-intuitive that humanity has not been contacted by extraterrestrial intelligence. A numerical, statistical analysis was conducted to determine whether this apparent loneliness is, in fact, unexpected. An inequality was derived to relate the frequency of life arising and developing technology on a suitable planet in the galaxy, the average length of time since the first broadcast of such a civilization, and a constant term. An analysis of the sphere reached thus far by human communication was also conducted, considering our local neighborhood and planets of particular interest. We clearly show that human communication has not reached a number of stars and planets adequate to expect an answer. These analyses both conclude that the Fermi paradox is not, in fact, unexpected. By the mediocrity principle and numerical modeling, it is actually unlikely that the Earth would have been reached by extraterrestrial communication at this point. We predict that under 1 percent of the galaxy has been reached at all thus far, and we do not anticipate to be reached until approximately half of the stars/planets have been reached. We offer a prediction that we should not expect this until at least 1,500 years in the future. Thus the Fermi paradox is not a shocking observation, and humanity may very well be contacted within our species' lifespan.
Pub.: 15 Jun '16, Pinned: 08 Jul '17
Abstract: I introduce the Fermi Paradox and some of its solutions. Then I present my own solution which includes two proposals called the Subanthropic Principle and the Undetectability Conjecture. After discussing some consequences of this solution, I make some comments about brane world scenarios and their potential to strengthen the Fermi Paradox. Finally, in the appendix I have included some questions and answers that came up during this Forum. -- En primer lugar introduzco la Paradoja de Fermi y algunas de sus soluciones. Luego presento la solucion que yo he propuesto, que incluye dos hipotesis que denomino el Principio Subantropico y la Conjetura de Indetectabilidad. Despues de discutir algunas consecuencias de esta solucion, paso a hacer algunos comentarios sobre las teorias de universos branas y su potencial para reforzar la Paradoja de Fermi. Finalmente, en el apendice incluyo algunas preguntas y respuestas que surgieron durante este Forum.
Pub.: 12 Jan '06, Pinned: 08 Jul '17
Abstract: Persistence phenomena in colonization processes could explain the negative results of SETI search preserving the possibility of a galactic civilization. However, persistence phenomena also indicates that search of technological civilizations in stars in the neighbourhood of Sun is a misdirected SETI strategy. This last conclusion is also suggested by a weaker form of the Fermi paradox. A simple model of a branching colonization which includes emergence, decay and branching of civilizations is proposed. The model could also be used in the context of ant nests diffusion.
Pub.: 08 Dec '01, Pinned: 08 Jul '17
Join Sparrho today to stay on top of science
Discover, organise and share research that matters to you