R
Richard Harang
Researcher at United States Army Research Laboratory
Publications - 59
Citations - 1426
Richard Harang is an academic researcher from United States Army Research Laboratory. The author has contributed to research in topics: Malware & Intrusion detection system. The author has an hindex of 16, co-authored 57 publications receiving 1072 citations. Previous affiliations of Richard Harang include University of California, Santa Barbara.
Papers
More filters
Proceedings ArticleDOI
Crafting adversarial input sequences for recurrent neural networks
TL;DR: In this article, the authors investigate adversarial input sequences for recurrent neural networks processing sequential data, and they show that the classes of algorithms introduced previously to craft adversarial samples misclassified by feed-forward neural networks can be adapted to recurrent Neural Networks.
Proceedings Article
De-anonymizing programmers via code stylometry
Aylin Caliskan-Islam,Richard Harang,Andrew Liu,Arvind Narayanan,Clare R. Voss,Fabian Yamaguchi,Rachel Greenstadt +6 more
TL;DR: This work investigates machine learning methods to de-anonymize source code authors of C/C++ using coding style using random forest and abstract syntax tree-based approach, and finds that the code resulting from difficult programming tasks is easier to attribute than easier tasks and skilled programmers are easier to attributes than less skilled programmers.
Posted Content
Crafting Adversarial Input Sequences for Recurrent Neural Networks
TL;DR: This paper investigates adversarial input sequences for recurrent neural networks processing sequential data and shows that the classes of algorithms introduced previously to craft adversarial samples misclassified by feed-forward neural networks can be adapted to recurrent Neural networks.
Book ChapterDOI
Source Code Authorship Attribution Using Long Short-Term Memory Based Networks
TL;DR: This work states that the introduction of features derived from the Abstract Syntax Tree of source code has recently set new benchmarks in this area, significantly improving over previous work that relied on easily obfuscatable lexical and format features of program source code.
Proceedings ArticleDOI
When Coding Style Survives Compilation: De-anonymizing Programmers from Executable Binaries
Aylin Caliskan,Fabian Yamaguchi,Edwin Dauber,Richard Harang,Konrad Rieck,Rachel Greenstadt,Arvind Narayanan +6 more
TL;DR: It is shown that programmers who would like to remain anonymous need to take extreme countermeasures to protect their privacy, using both obfuscated binaries, and real-world code found "in the wild" in single-author GitHub repositories and the recently leaked Nulled.IO hacker forum.