Nowhere to Hide: How HW Telemetry and ML Can Make Life Tough for Exploits


Posted on in Presentations

HW can reveal the execution of even the best concealed malicious code at an instruction level. This talk goes into details of how scalable, deployable, runtime threat and anomaly detection solutions can be built with CPU telemetry and machine learning. Specifics of telemetry sources, feature selection, overhead management and platform domain specific design considerations will be discussed.

Pre-Requisites: Basic understanding of exploits/malwar and machine learning. Some knowledge of Intel architecture would be helpful but not absolutely required.


Participants
Rahuldeva Ghosh

Participant

Security Architect, Intel Corp

Dr. Zheng Zhang

Participant

Principal Engineer, Intel Corp

Machine Learning & Artificial Intelligence Hackers & Threats Analytics Intelligence & Response

zero day vulnerability endpoint security behavioral analytics artificial intelligence & machine learning anti-malware


Topic

Subtopic


Share With Your Community