What’s Needed to Deliver the Nationwide Quantum Internet Blueprint – HPCwire

While few details accompanied last weeks official announcement of U.S. plans for a nation-wide quantum internet, many of the priorities and milestones had been worked out during a February workshop and are now available in subsequent reports. The Department of Energy is leading the effort which is part of the U.S. Quantum Initiative passed in 2019.

The race to harness quantum information science whether through computing, communications, or sensing has become a global competition. In many ways quantum communications is the furthest along in development and its promise of near absolute security is extremely alluring. DOEs 17 National Laboratories are intended to serve as the backbone of the U.S. quantum internet effort.

As noted in the official announcement, Crucial steps toward building such an internet are already underway in the Chicago region, which has become one of the leading global hubs for quantum research. In February of this year, scientists from DOEs Argonne National Laboratory in Lemont, Illinois, and the University of Chicagoentangled photons across a 52-milequantumloop in the Chicago suburbs, successfully establishing one of the longest land-based quantum networks in the nation. That network will soon be connected to DOEs Fermilab in Batavia, Illinois, establishing a three-node, 80-mile testbed.

Turning early prototypes into a scaled-up nationwide effort involves tackling many technical challenges. One thorny problem, for example, is development of robust repeater technology, which among other things requires reliable quantum memory technology and prevention of signal loss. Interestingly, satellites may play a role as a bridge according to the report:

A quantum Internet will not exist in isolation apart from the current classical digital networks. Quantum information largely is encoded in photons and transmitted over optical fiber infrastructure that is used widely by todays classical networks. Thus, at a fundamental level, both are supported by optical fiber that implements lightwave channels. Unlike digital information encoded and transmitted over current fiber networks, quantum information cannot be amplified with traditional mechanisms as the states will be modified if measured.

While quantum networks are expected to use the optical fiber infrastructure, it could be that special fibers may enable broader deployment of this technology. At least in the near term, satellite-based entanglement bridges could be used to directly connect transcontinental and transatlantic Q-LANs. Preliminary estimates indicate that entangled pairs could be shared at rates exceeding 106 in a single pass of a Medium Earth Orbit (MEO) satellite. Such a capability may be a crucial intermediate step, while efficient robust repeaters are developed (as some estimates predict more than 100 repeaters would be needed to establish a transatlantic link).

The report from the workshop spells out four priorities along with five milestones. (The event was chaired by Kerstin Kleese van Dam, Brookhaven National Laboratory; Inder Monga, Energy Sciences Network; Nicholas Peters, Oak Ridge National Laboratory; and Thomas Schenkel, Lawrence Berkeley National Laboratory).

Here are the four priorities identified in the report:

Some of the test cases being discussed are fascinating such as one across Long Island, NY:

For example, there would be considerable value in expanding on the current results gleaned from the Brookhaven LabSBUESnet collaboration, which in April 2019 achieved the longest distance entanglement distribution experiment in the United States by covering approximately 20 km. Integral to the testbed are room-temperature quantum network prototypes, developed by SBUs Quantum Information Technology (QIT) laboratory, that connect several quantum memories and qubit sources. The combination of these important results allowed the BrookhavenSBU ESnet team to design and implement a quantum network prototype that connects several locations at Brookhaven Lab and SBU.

By using quantum memories to enhance the swapping of the polarization entanglement of flying photon pairs, the implementation aims to distribute entanglement over long distances without detrimental losses. The team has established a quantum network on Long Island, N.Y., using ESnets and Crown Castle fiber infrastructure, which encompasses approximately 120-km fiber length connecting Brookhaven Lab, SBU, and Center of Excellence in Wireless and Information Technology (CEWIT) at SBU campus locations.

As a next step, the team plans to connect this existing quantum network with the Manhattan Landing (MAN- LAN) in New York City, a high-performance exchange point where several major networks converge. This work would set the stage for a nationwide quantum-protected information exchange network. Figure 3:3 depicts the planned network configuration.

Here are milestones called out in the report:

A fifth broad milestone the Cross-cutting milestone: Build a Multi-institutional Ecosystem emphasizes the importance of federal agency cooperation and coordination and names DOE, NSF, NIST, DoD, NSA, and NASA as key players. While pursuing these alliances, critical opportunities for new directions and spin-off applications should be encouraged by robust cooperation with quantum communication startups and large optical communications companies. Early adopters can deliver valuable design metrics.

Its a clearly ambitious agenda. Stay tuned.

Link to announcement, https://www.hpcwire.com/off-the-wire/doe-unveils-blueprint-for-the-quantum-internet-in-event-at-university-of-chicago/

Link to slide deck, https://science.osti.gov/-/media/ascr/ascac/pdf/meetings/202004/Quantum_Internet_Blueprint_Update.pdf?la=en&hash=8C076C1BEB7CA49A3920B1A3C15AA531B48BDD72

Link to full report, https://www.energy.gov/sites/prod/files/2020/07/f76/QuantumWkshpRpt20FINAL_Nav_0.pdf

Read more from the original source:
What's Needed to Deliver the Nationwide Quantum Internet Blueprint - HPCwire

Asia Pacific Deep Learning Chip Market: Rising Significance of Quantum Computing is Propelling the Growth of the Market Science Market Reports -…

Thedeep learning chip marketin Asia Pacific is expected to grow from US$ 372.0 Mn in 2018 to US$ 5,702.2 Mn by the year 2027 with a CAGR of 35.7% from the year 2019 to 2027.

Driving factor such as the rising significance of quantum computing is propelling the growth of thedeep learning chip market. Further, the growing adoption of deep learning chips mainly for edge devices is anticipated to propel the deep learning chip market growth in the near future. Quantum computing takes seconds to finish a calculation that would otherwise takes more time. Quantum computers are an innovative transformation of artificial intelligence, machine learning, and big data. Therefore, prominence of quantum computing is expected to drive the growth of deep learning chip market.

The Asia Pacific Deep Learning Chip Market is growing along with the Technology, Media and Telecommunications industry, but the market is likely to slow down its growth due to the shortage of skilled professionals, suggests the Business Market Insights report.

The Business Market Insights subscription helps clients understand the ongoing market trends, identify opportunities, and make informed decisions through the reports in the Subscription Platform. The Industry reports available in the subscription provide an in-depth analysis on various market topics and enable clients to line up remunerative opportunities. The reports provide the market size & forecast, drivers, challenges, trends, and more.

Register for a free trial today and gain instant access to our market research reports @

https://www.businessmarketinsights.com/TIPRE00008602/request-trial

The China dominated the deep learning chip market in 2018 and is expected to dominate the market with the highest share in the Asia Pacific region through the forecast period. The creation of Chinas first national laboratory for deep learning, was initiated in Beijing in a move that could help the country surpass the US in developing AI. In 2017, The National Development and Reform Commission (NDRC) approved the plan to open up a national engineering lab for researching and implementing deep learning technologies. China is at the forefront of new and emerging technologies such as AI, and the adoption and implementation rate of AI is high across all major industry verticals. The government is keen in maintaining Chinas stronghold and competitiveness, especially in the adoption of advanced technologies. The above-mentioned factors are, therefore, contributing to the growth of the deep learning chip market in the country.

These factorsare expectedto offer broad growth opportunities in the Technology, Media and Telecommunications industry and this is expected to cause the demand forAsia Pacific Deep Learning Chip Market in the market.

Business Market Insights reports focus upon client objectives, use standard research methodologies and exclusive analytical models, combined with robust business acumen, which provides precise and insightful results.

Business Market Insights reports are useful not only for corporate and academic professionals but also for consulting, research firms, PEVC firms, and professional services firms.

ASIA PACIFIC DEEP LEARNING CHIP MARKET SEGMENTATION

ASIA PACIFIC DEEP LEARNING CHIP By Chip Type

ASIA PACIFIC DEEP LEARNING CHIP By Technology

ASIA PACIFIC DEEP LEARNING CHIP By Industry Vertical

ASIA PACIFIC DEEP LEARNING CHIP By Country

Deep Learning Chip Market Companies Mentioned

Business Market Insights provides affordable subscription with pay as per requirement @

https://www.businessmarketinsights.com/TIPRE00008602/checkout/basic/single/monthly

(30-day subscription plans proveto beverycost-effectivewith no compromise on the quality of reports)

Benefits with Business Market Insights

About Business Market Insights

Based in New York, Business Market Insights is a one-stop destination for in-depth market research reports from various industries including Technology, Media & Telecommunications, Semiconductor & Electronics, Aerospace & Defense, Automotive & Transportation, Biotechnology, Healthcare IT, Manufacturing & Construction, Medical Device, and Chemicals & Materials. The clients include corporate and academic professionals, consulting, research firms,PEVCfirms, and professional services firms.

For Subscription contact

Business Market Insights

Phone :+442081254005E-Mail :[emailprotected]

See original here:
Asia Pacific Deep Learning Chip Market: Rising Significance of Quantum Computing is Propelling the Growth of the Market Science Market Reports -...

Quantum reckoning: The day when computers will break cryptography – ITWeb

Roger Grimes

An age of unbelievably fast quantum computers is only a stones throw away, promising machines that will forever transform the way we solve problems, communicate and compute.

However, such powerful machines in the wrong hands could spell major trouble for the cyber security community, as many experts fear that quantum computers could also effectively break even the strongest encryption we have today.

So when can we expect to see these quantum machines in action? Theres a chance that it has already happened, by either the US NSA (National Security Agency) or China, but we dont publicly know about it yet," says Roger Grimes, Data-Driven Defence evangelist at KnowBe4, who will be speaking on Quantum reckoning: The coming day when quantum computers break cryptography at ITWeb Security Summit 2020, to be held as a virtual event from 25 to 28 August this year.

According to Grimes, if it hasnt happened already, many people believe it will happen within the next two years.

Speaking of how this quantum reckoning could impact information security, Grimes says any secret protected by traditional asymmetric ciphers will no longer be protected. This includes RSA, Diffie-Hellman, Elliptic Curve Cryptography which is used in HTTPS, TLS, WiFi, FIDO keys, PKI, digital certificates, digital signatures and banking networks. Essentially, it would impact about 95% of our digital world.

Its not all bad news, though. He says along with the dangers, quantum computing will bring us many wonderful inventions we cannot even begin to imagine right now, much as the Internet did, but on an even greater scale.

There is a glimmer of hope in that post-quantum cryptography, or cryptographic algorithms that are believed to be secure against an attack by a quantum computer, might save the day.

Grimes says its a race, but that dozens of good quantum-resistant cryptography standards are being tested right now and there are likely to be some good standards in place by the time the quantum reckoning becomes public and widespread.

But once the new cryptography standards are in place, how long will it take every person and company and the world to switch over to the new quantum-resistant standards? That is the real problem, he adds.

Delegates attending Grimes talk will learn exactly what it is they need to start doing now in order to prepare for the quantum reckoning.

Read the original post:
Quantum reckoning: The day when computers will break cryptography - ITWeb

3 steps for teaching cybersecurity in the classroom – SmartBrief

Students live much of their lives online, especially now with the transition to remote learning. Cybersecurity skills are a must. They need to understand how to safely navigate this digital world, taking advantage of its offerings while avoiding the dangers of its darker corners.

Our district, Hurst-Euless-Bedford Independent School District in Bedford, Texas, launched its first cybersecurity class for seventh-grade students in 2018. When we began our journey, there were no cybersecurity experts among the teaching staff -- we just had a sense of urgency to provide a high-quality curriculum for our students. We wanted to equip them with skills they could use now and take into the workforce. We discovered CYBER.org, an organization aimed at K-12 cybersecurity education and workforce development. We worked with them to create a program, based on three core principles, that has become a training ground for our students.

Several cyber curricula are available for grades 9-12 but none that begin at the junior high or middle school level so we built our own. Its designed for grades 7 and 8. We wanted to give students a foundation of cybersecurity knowledge and skills that would prepare them for high school coursework and later, industry certifications.

Our curriculum features a sequence of concepts from the first-level high school cybersecurity course taught in the ninth grade. It takes into account the preexisting knowledge and the maturity level of the student. Concepts include Hardware/Operating Systems, Software (including malware), Networks, Coding, Cryptography, Digital Citizenship/Cyber Safety, Career Explorations and Ethics/Law (including ethical hacking). We then focused our professional development efforts in these areas.

Cybersecurity curriculum is rigorous; it can be intimidating for educators who have no background in the field. Our vertical program -- concepts presented in sequence over three years -- aims to remove the fear factor. It breaks complex ideas into smaller concepts, making it easier for teachers and students to gain confidence and mastery.

In our program, we introduce a concept in seventh grade, expand on it in eighth grade, then assess for mastery in ninth grade, using the Texas Essential Knowledge and Skills for the Foundations of Cybersecurity Course as our guide. For example, in the Cryptography track, students spend their seventh grade year learning the basics -- what cryptography is, its purpose and why data needs to be encrypted. The following year, they research historical uses of cryptography and investigate different methods, including shift ciphers, substitution ciphers and Morse code ciphers. In ninth grade, students create their own ciphers and compete in an ethical hacking competition to demonstrate mastery of the concept.

CYBER.org hosts the Cyber Education Discovery Forum, a three-day event, held each summer, for K-12 educators who teach cybersecurity programs. Breakout sessions and full-day workshops outlined tactics for teaching different security topics, getting students interested and exposing them to potential career opportunities in this field.

I attended the Cyber Fundamentals with micro:bit workshop. It taught the basics of block-based coding using the micro:bit, a pocket-sized programmable computer. This is perfect for our elementary-school computer-science students. We are considering ways we can use this tool to introduce coding and cyber concepts in the early grades, then build on those ideas in junior-high school.

We leaned heavily on CYBER.org support for our program rollout. They fielded questions about the curriculum and walked us step-by-step through the answers. And when we requested additional research materials -- to better understand the curriculum and implement it properly -- they were quick to supply us with what we needed.

Considering a program like this for your school? Here are some lessons we learned from our experience.

Kiera Elledge is the STEM coordinator for the Hurst-Euless-Bedford Independent School District in Bedford, Texas. She has recently focused on developing and implementing a three-year cyber curriculum for two of the districts five junior high schools.

___________________________________________________________________________________

Like this article? Sign up for SmartBrief on EdTech to get news like this in your inbox, or check out all of SmartBriefs education newsletters, covering career and technical education, educational leadership, math education and more.

Read more here:
3 steps for teaching cybersecurity in the classroom - SmartBrief

Facebooks Red Team Hacks Its Own AI Programs – WIRED

In 2018, Canton organized a risk-a-thon in which people from across Facebook spent three days competing to find the most striking way to trip up those systems. Some teams found weaknesses that Canton says convinced him the company needed to make its AI systems more robust.

One team at the contest showed that using different languages within a post could befuddle Facebooks automated hate-speech filters. A second discovered the attack used in early 2019 to spread porn on Instagram, but it wasnt considered an immediate priority to fix at the time. We forecast the future, Canton says. That inspired me that this should be my day job.

In the past year, Cantons team has probed Facebooks moderation systems. It also began working with another research team inside the company that has built a simulated version of Facebook called WW that can be used as a virtual playground to safely study bad behavior. One project is examining the circulation of posts offering goods banned on the social network, such as recreational drugs.

The red teams weightiest project aims to better understand deepfakes, imagery generated using AI that looks like it was captured with a camera. The results show that preventing AI trickery isnt easy.

Deepfake technology is becoming easier to access and has been used for targeted harassment. When Cantons group formed last year, researchers had begun to publish ideas for how to automatically filter out deepfakes. But he found some results suspicious. There was no way to measure progress, he says. Some people were reporting 99 percent accuracy, and we were like That is not true.

Facebooks AI red team launched a project called the Deepfakes Detection Challenge to spur advances in detecting AI-generated videos. It paid 4,000 actors to star in videos featuring a variety of genders, skin tones, and ages. After Facebook engineers turned some of the clips into deepfakes by swapping peoples faces around, developers were challenged to create software that could spot the simulacra.

The results, released last month, show that the best algorithm could spot deepfakes not in Facebooks collection only 65 percent of the time. That suggests Facebook isnt likely to be able to reliably detect deepfakes soon. Its a really hard problem, and its not solved, Canton says.

Cantons team is now examining the robustness of Facebook's misinformation detectors and political ad classifiers. Were trying to think very broadly about the pressing problems in the upcoming elections, he says.

Most companies using AI in their business dont have to worry as Facebook does about being accused of skewing a presidential election. But Ram Shankar Siva Kumar, who works on AI security at Microsoft, says they should still worry about people messing with their AI models. He contributed to a paper published in March that found 22 of 25 companies queried did not secure their AI systems at all. The bulk of security analysts are still wrapping their head around machine learning, he says. Phishing and malware on the box is still their main thing.

Last fall Microsoft released documentation on AI security developed in partnership with Harvard that the company uses internally to guide its security teams. It discusses threats such as model stealing, where an attacker sends repeated queries to an AI service and uses the responses to build a copy that behaves similarly. That stolen copy can either be put to work directly or used to discover flaws that allow attackers to manipulate the original, paid service.

Battista Biggio, a professor at the University of Cagliari who has been publishing studies on how to trick machine-learning systems for more than a decade, says the tech industry needs to start automating AI security checks.

Companies use batteries of preprogrammed tests to check for bugs in conventional software before it is deployed. Biggio says improving the security of AI systems in use will require similar tools, potentially building on attacks he and others have demonstrated in academic research.

That could help address the gap Kumar highlights between the numbers of deployed machine-learning algorithms and the workforce of people knowledgeable about their potential vulnerabilities. However, Biggio says biological intelligence will still be needed, since adversaries will keep inventing new tricks. The human in the loop is still going to be an important component, he says.

More Great WIRED Stories

The rest is here:
Facebooks Red Team Hacks Its Own AI Programs - WIRED

Seeing the big picture: Deep learning-based fusion of behavior signals for threat detection – Microsoft

The application of deep learning and other machine learning methods to threat detection on endpoints, email and docs, apps, and identities drives a significant piece of the coordinated defense delivered by Microsoft Threat Protection. Within each domain as well as across domains, machine learning plays a critical role in analyzing and correlating massive amounts of data to detect increasingly evasive threats and build a complete picture of attacks.

On endpoints, Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP) detects malware and malicious activities using various types of signals that span endpoint and network behaviors. Signals are aggregated and processed by heuristics and machine learning models in the cloud. In many cases, the detection of a particular type of behavior, such as registry modification or a PowerShell command, by a single heuristic or machine learning model is sufficient to create an alert.

Detecting more sophisticated threats and malicious behaviors considers a broader view and is significantly enhanced by fusion of signals occurring at different times. For example, an isolated event of file creation is generally not a very good indication of malicious activity, but when augmented with an observation that a scheduled task is created with the same dropped file, and combined with other signals, the file creation event becomes a significant indicator of malicious activity. To build a layer for these kinds of abstractions, Microsoft researchers instrumented new types of signals that aggregate individual signals and create behavior-based detections that can expose more advanced malicious behavior.

In this blog, we describe an application of deep learning, a category of machine learning algorithms, to the fusion of various behavior detections into a decision-making model. Since its deployment, this deep learning model has contributed to the detection of many sophisticated attacks and malware campaigns. As an example, the model uncovered a new variant of the Bondat worm that attempts to turn affected machines into zombies for a botnet. Bondat is known for using its network of zombie machines to hack websites or even perform cryptocurrency mining. This new version spreads using USB devices and then, once on a machine, achieves a fileless persistence. We share more technical details about this attack in latter sections, but first we describe the detection technology that caught it.

Identifying and detecting malicious activities within massive amounts of data processed by Microsoft Defender ATP require smart automation methods and AI. Machine learning classifiers digest large volumes of historical data and apply automatically extracted insights to score each new data point as malicious or benign. Machine learning-based models may look at, for example, registry activity and produce a probability score, which indicates the probability of the registry write being associated with malicious activity. To tie everything together, behaviors are structured into virtual process trees, and all signals associated with each process tree are aggregated and used for detecting malicious activity.

With virtual process trees and signals of different types associated to these trees, there are still large amounts of data and noisy signals to sift through. Since each signal occurs in the context of a process tree, its necessary to fuse these signals in the chronological order of execution within the process tree. Data ordered this way requires a powerful model to classify malicious vs. benign trees.

Our solution comprises several deep learning building blocks such as Convolutional Neural Networks (CNNs) and Long Short-Term Memory Recurrent Neural Networks (LSTM-RNN). The neural network can take behavior signals that occur chronologically in the process tree and treat each batch of signals as a sequence of events. These sequences can be collected and classified by the neural network with high precision and detection coverage.

Microsoft Defender ATP researchers instrument a wide range of behavior-based signals. For example, a signal can be for creating an entry in the following registry key:

HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsCurrentVersionRun

A folder and executable file name added to this location automatically runs after the machine starts. This generates persistence on the machine and hence can be considered an indicator of compromise (IoC). Nevertheless, this IoC is generally not enough to generate detection because legitimate programs also use this mechanism.

Another example of behavior-based signal is service start activity. A program that starts a service through the command line using legitimate tools like net.exe is not considered a suspicious activity. However, starting a service created earlier by the same process tree to obtain persistence is an IoC.

On the other hand, machine learning-based models look at and produce signals on different pivots of a possible attack vector. For example, a machine learning model trained on historical data to discern between benign and malicious command lines will produce a score for each processed command line.

Consider the following command line:

cmd /c taskkill /f /im someprocess.exe

This line implies that taskill.exe is evoked by cmd.exe to terminate a process with a particular name. While the command itself is not necessarily malicious, the machine learning model may be able to recognize suspicious patterns in the name of the process being terminated, and provide a maliciousness probability, which is aggregated with other signals in the process tree. The result is a sequence of events during a certain period of time for each virtual process tree.

The next step is to use a machine learning model to classify this sequence of events.

The sequences of events described in the previous sections can be represented in several different ways to then be fed into machine learning models.

The first and simple way is to construct a dictionary of all possible events, and to assign a unique identifier (index) to each event in the dictionary. This way, a sequence of events is represented by a vector, where each slot constitutes the number of occurrences (or other related measure) for an event type in the sequence.

For example, if all possible events in the system are X,Y, and Z, a sequence of events X,Z,X,X is represented by the vector [3, 0, 1], implying that it contains three events of type X, no events of type Y, and a single event of type Z. This representation scheme, widely known as bag-of-words, is suitable for traditional machine learning models and has been used for a long time by machine learning practitioners. A limitation of the bag-of-words representation is that any information about the order of events in the sequence is lost.

The second representation scheme is chronological. Figure 1 shows a typical process tree: Process A raises an event X at time t1, Process B raises an event Z at time t2, D raises X at time t3, and E raises X at time t4. Now the entire sequence X,Z,X,X (or [1,3,1,1] replacing events by their dictionary indices) is given to the machine learning model.

Figure 1. Sample process tree

In threat detection, the order of occurrence of different events is important information for the accurate detection of malicious activity. Therefore,its desirable to employ a representation scheme that preserves the order of events, as well as machine learning models that are capable of consuming such ordered data. This capability can be found in the deep learning models described in the next section.

Deep learning has shown great promise in sequential tasks in natural language processing like sentiment analysis and speech recognition. Microsoft Defender ATP uses deep learning for detecting various attacker techniques, including malicious PowerShell.

For the classification of signal sequences, we use a Deep Neural Network that combines two types of building blocks (layers): Convolutional Neural Networks (CNN) and Bidirectional Long Short-Term Memory Recurrent Neural Networks (BiLSTM-RNN).

CNNs are used in many tasks relating to spatial inputs such as images, audio, and natural language. A key property of CNNs is the ability to compress a wide-field view of the input into high-level features. When using CNNs in image classification, high-level features mean parts of or entire objects that the network can recognize. In our use case, we want to model long sequences of signals within the process tree to create high-level and localized features for the next layer of the network. These features could represent sequences of signals that appear together within the data, for example, create and run a file, or save a file and create a registry entry to run the file the next time the machine starts. Features created by the CNN layers are easier to digest for the ensuing LSTM layer because of this compression and featurization.

LSTM deep learning layers are famous for results in sentence classification, translation, speech recognition, sentiment analysis, and other sequence modeling tasks. Bidirectional LSTM combine two layers of LSTMs that process the sequence in opposite directions.

The combination of the two types of neural networks stacked one on top of the other has shown to be very effective and can classify long sequences of hundreds of items and more. The final model is a combination of several layers: one embedding layer, two CNNs, and a single BiLSTM. The input to this model is a sequence of hundreds of integers representing the signals associated with a single process tree during a unit of time. Figure 2 shows the architecture of our model.

Figure 2. CNN-BiLSTM model

Since the number of possible signals in the system is very high, input sequences are passed through an embedding layer that compresses high-dimensional inputs into low-dimensional vectors that can be processed by the network. In addition, similar signals get a similar vector in lower-dimensional space, which helps with the final classification.

Initial layers of the network create increasingly high-level features, and the final layer performs sequence classification. The output of the final layer is a score between 0 and 1 that indicates the probability of the sequence of signals being malicious. This score is used in combination with other models to predict if the process tree is malicious.

Microsoft Defender ATPs endpoint detection and response capabilities use this Deep CNN-BiLSTM model to catch and raise alerts on real-world threats. As mentioned, one notable attack that this model uncovered is a new variant of the Bondat worm, which was seen propagating in several organizations through USB devices.

Figure 3. Bondat malware attack chain

Even with an arguably inefficient propagation method, the malware could persist in an organization as users continue to use infected USB devices. For example, the malware was observed in hundreds of machines in one organization. Although we detected the attack during the infection period, it continued spreading until all malicious USB drives were collected. Figure 4 shows the infection timeline.

Figure 4. Timeline of encounters within a single organization within a period of 5 months showing reinfection through USB devices

The attack drops a JavaScript payload, which it runs directly in memory using wscript.exe. The JavaScript payload uses a randomly generated filename as a way to evade detections. However, Antimalware Scan Interface (AMSI) exposes malicious script behaviors.

To spread via USB devices, the malware leverages WMI to query the machines disks by calling SELECT * FROM Win32_DiskDrive. When it finds a match for /usb (see Figure 5), it copies the JavaScript payload to the USB device and creates a batch file on the USB devices root folder. The said batch file contains the execution command for the payload. As part of its social engineering technique to trick users into running the malware in the removable device, it creates a LNK file on the USB pointing to the batch file.

Figure 5. Infection technique

The malware terminates processes related to antivirus software or debugging tools. For Microsoft Defender ATP customers, tamper protection prevents the malware from doing this. Notably, after terminating a process, the malware pops up a window that imitates a Windows error message to make it appear like the process crashed (See figure 6).

Figure 6. Evasion technique

The malware communicates with a remote command-and-control (C2) server by implementing a web client (MSXML). Each request is encrypted with RC4 using a randomly generated key, which is sent within the PHPSESSID cookie value to allow attackers to decrypt the payload within the POST body.

Every request sends information about the machine and its state following the output of the previously executed command. The response is saved to disk and then parsed to extract commands within an HTML comment tag. The first five characters from the payload are used as key to decrypt the data, and the commands are executed using the eval() method. Figures 7 and 8 show the C2 communication and HTML comment eval technique.

Once the command is parsed and evaluated by the JavaScript engine, any code can be executed on an affected machine, for example, download other payloads, steal sensitive info, and exfiltrate stolen data. For this Bondat campaign, the malware runs coin mining or coordinated distributed denial of service (DDoS) attacks.

Figure 7. C2 communication

Figure 8. Eval technique (parsing commands from html comment)

The malwares activities triggered several signals throughout the attack chain. The deep learning model inspected these signals and the sequence with which they occurred, and determined that the process tree was malicious, raising an alert:

Modeling a process tree, given different signals that happen at different times, is a complex task. It requires powerful models that can remember long sequences and still be able to generalize well enough to churn out high-quality detections. The Deep CNN-BiLSTM model we discussed in this blog is a powerful technology that helps Microsoft Defender ATP achieve this task. Today, this deep learning-based solution contributes to Microsoft Defender ATPs capability to detect evolving threats like Bondat.

Microsoft Defender ATP raises alerts for these deep learning-driven detections, enabling security operations teams to respond to attacks using Microsoft Defender ATPs other capabilities, like threat and vulnerability management, attack surface reduction, next-generation protection, automated investigation and response, and Microsoft Threat Experts. Notably, these alerts inform behavioral blocking and containment capabilities, which add another layer of protection by blocking threats if they somehow manage to start running on machines.

The impact of deep learning-based protections on endpoints accrues to the broader Microsoft Threat Protection (MTP), which combines endpoint signals with threat data from email and docs, identities, and apps to provide cross-domain visibility. MTP harnesses the power of Microsoft 365 security products to deliver unparalleled coordinated defense that detects, blocks, remediates, and prevents attacks across an organizations Microsoft 365 environment. Through machine learning and AI technologies like the deep-learning model we discussed in this blog, MTP automatically analyzes cross-domain data to build a complete picture of each attack, eliminating the need for security operations centers (SOC) to manually build and track the end-to-end attack chain and relevant details. MTP correlates and consolidates attack evidence into incidents, so SOCs can save time and focus on critical tasks like expanding investigations and proacting threat hunting.

Arie Agranonik, Shay Kels, Guy Arazi

Microsoft Defender ATP Research Team

Questions, concerns, or insights on this story? Join discussions at the Microsoft Threat Protection and Microsoft Defender ATP tech communities.

Read all Microsoft security intelligence blog posts.

Follow us on Twitter @MsftSecIntel.

Go here to read the rest:
Seeing the big picture: Deep learning-based fusion of behavior signals for threat detection - Microsoft

Machine Learning as a Service Market: Assessing the Fallout From the Coronavirus Pandemic – Market Research Posts

Machine Learning as a Service Market report covers the Introduction, Product Type and Application, Market Overview, Market Analysis by Countries, Market Opportunities, Market Risk and Market Driving Force. Under Coronavirus (COVID19) outbreak globally, this Machine Learning as a Service industry report provides 360 degrees of analysis from Supply Chain, Import and Export control to regional government policy and future influence on the industry.Focuses on the topmost key Machine Learning as a Service market manufactures/players like(Amazon, Oracle Corporation, IBM, Microsoft Corporation, Google Inc., Salesforce.Com, Tencent, Alibaba, UCloud, Baidu, Rackspace, SAP AG, Century Link Inc., CSC (Computer Science Corporation), Heroku, Clustrix, Xeround), to define, describe and analyze the Sales Volume, Value, Market Share, Capacity, Production, Price, Revenue, Cost, Gross, Gross Margin, Machine Learning as a Service Market Competition Landscape, SWOT Analysis and Development Plans in next few years.

Get Free Sample PDF (including COVID19 Impact Analysis, full TOC, Tables and Figures)of Machine Learning as a Service[emailprotected]https://www.researchmoz.us/enquiry.php?type=S&repid=2302143

Which Prime Data Figures are Included in This Machine Learning as a Service Market Report-Market size (Last few years, current and expected); Market share analysis as per different companies; Machine Learning as a Service Market forecast; Demand; Price Analysis; Machine Learning as a Service Market Contributions (Size, Share as per regional boundaries).

Scope of Machine Learning as a Service Market:Machine learning is a field of artificial intelligence that uses statistical techniques to give computer systems the ability to learn (e.g., progressively improve performance on a specific task) from data, without being explicitly programmed.

On the basis on the end users/applications,this report focuses on the status and outlook for major applications/end users, shipments, revenue (Million USD), price, and market share and growth rate foreach application.

Personal Business

On the basis of product type, this report displays the shipments, revenue (Million USD), price, and market share and growth rate of each type.

Private clouds Public clouds Hybrid cloud

Do You Have Any Query Or Specific Requirement? Ask to Our Industry[emailprotected]https://www.researchmoz.us/enquiry.php?type=E&repid=2302143

Machine Learning as a Service Market Regional Analysis Covers:

Some Important Highlights From The Machine Learning as a Service Market Report Include:

To Get Discount of Machine Learning as a Service Market:https://www.researchmoz.us/enquiry.php?type=D&repid=2302143

Contact:

ResearchMozMr. Rohit Bhisey,Tel: +1-518-621-2074USA-Canada Toll Free: 866-997-4948Email:[emailprotected]

Browse More Reports Visit @https://www.mytradeinsight.blogspot.com/

View original post here:
Machine Learning as a Service Market: Assessing the Fallout From the Coronavirus Pandemic - Market Research Posts

Go Inside The ACLU’s Fight For Civil Rights In The Trump Era This Wednesday – Broadway World

On Wednesday, July 29, at 3 p.m. ET, Intercept Editor-in-Chief Betsy Reed will host a virtual conversation on the current state of civil rights in the Trump era with three American Civil Liberties Union lawyers at the center of these fights: Brigitte Amiri, deputy director at the ACLU Reproductive Freedom Project; Lee Gelernt, deputy director of the ACLU Immigrants' Rights Project; and Chase Strangio, deputy director for Transgender Justice with the ACLU LGBT & HIV Project.Watch Live: https://theintercept.com/2020/07/24/aclu-trump-the-fight-documentary/

The conversation coincides with the upcoming release of the new documentary The Fight, an inside look at four high-profile ACLU lawsuits that attempt to block the Trump administration's efforts to target immigrants, women, and the LGBTQ community. The film, directed by Eli B. Despres, Josh Kriegman and Elyse Steinberg, is being released by Magnolia Pictures and Topic Studios and will be available in theaters and on demand on July 31.

From the early days of his administration, President Donald Trump has overseen a barrage of legislative attacks on marginalized communities: ripping immigrant families apart, blocking access to abortion, and banning transgender people from military service. As grassroots movements responded to these attacks with unprecedented protests, the legal team at the ACLU launched more than 150 lawsuits aimed at protecting our civil rights and liberties from encroaching authoritarianism. What: "Inside the ACLU's Fight for Civil Rights in the Trump Era" When: Watch Live on Wednesday, July 29, 2020 Time: 3 p.m. ET Where: This event will be streamed live on The Intercept, as well as on The Intercept's official YouTube, Facebook, and Twitter pages Who: Intercept Editor-in-Chief Betsy Reed, Brigitte Amiri, deputy director at the ACLU Reproductive Freedom Project; Lee Gelernt, deputy director of the ACLU national Immigrants' Rights Project; and Chase Strangio, deputy director for Transgender Justice with the ACLU LGBT & HIV Project Bios:

Betsy Reed became Editor-in-Chief of The Intercept in 2015. Since then, The Intercept has earned many awards - and millions of readers - with its fearless reporting on a range of issues, from war, surveillance, and U.S. politics to the environment, technology, prisons, the death penalty, the media, and more.

Among the awards The Intercept has won under Reed's tenure are a George Polk Award, a National Magazine Award, a Sidney Hillman Prize, the Innocence Network Journalism Award, and an Edward R. Murrow Award. The Intercept Brasil, launched in 2016, has achieved wide recognition for its groundbreaking journalism in Brazil. Prior to joining The Intercept, Reed was executive editor of The Nation, where she led the magazine's investigative coverage while also editing and writing political commentary.

Brigitte Amiri is a deputy director at the ACLU's Reproductive Freedom Project. She is currently litigating numerous cases, including leading the Jane Doe case, challenging the Trump administration's ban on abortion for unaccompanied immigrant minors. She also represents the last abortion clinic in Kentucky, and is lead counsel in a challenge to Kentucky's six-week abortion ban and another challenge against the state's attempts to close the clinic's doors. Ms. Amiri also leads the Project's efforts to ensure that religious objections are not used to discriminate against or harm people seeking access to reproductive health care.

Lee Gelernt is the deputy director of the ACLU's national Immigrants' Rights Project and director of the project's Access to the Court's Program. He has argued many of the highest profile challenges to the Trump Administration's immigration policies, including its family separation practice. He is widely considered one of the nation's leading public interest lawyers and has been recognized as one of the top 500 lawyers in the country in any field. Lee has argued dozens of groundbreaking cases throughout the country, including in the U.S. Supreme Court, where he will again be arguing in March, on behalf of asylum seekers.

Chase Strangio is the deputy director for Transgender Justice with the ACLU's LGBT & HIV Project and a nationally recognized expert on trans rights. He is counsel in the ACLU's challenge to North Carolina's notorious anti-trans law, HB2, Carcao, et al. v. Cooper, et al, the ACLU's challenge to Trump's trans military ban, Stone v. Trump, and the case of Aimee Stephens, R.G. & G.R. Harris Funeral Homes v. EEOC, which is pending before the Supreme Court. He was counsel to whistleblower Chelsea Manning in her lawsuit against the Department of Defense for discriminatory denial of health treatment while in custody and worked with the team defending the rights of transgender student, Gavin Grimm, before the Supreme Court. He also appears regularly in the media and lobbies in state legislatures around the country on issues impacting trans and nonbinary people.

Alan Menken Becomes an EGOT With This Weekend's Emmy Award Win Alan Menken is officially an EGOT thanks to his first Emmy Award win this weekend!...

Barbra Streisand, Kristin Chenoweth, Renee Elise Goldsberry and More Join Joe Biden Fundraising Concert A star-studded lineup including, Barbra Streisand, Rene Elise Goldsberry, Kristin Chenoweth, John Legend, Jane Krakowski have joined the list of stag...

VIDEO: HAMILTON Original Cast Members Phillipa Soo, Daveed Diggs, Renee Elise Goldsberry, and More Share Their Favorite Fan Moments A new video was released on the official Hamilton social media accounts, featuring the show's original stars sharing their favorite fan moments....

HAMILTON Star Emmy Raver-Lampman to Join CENTRAL PARK in the Role of 'Molly' Ithas been announced that Hamilton star Emmy Raver-Lampman will join the cast of the animated series, Central Parkin the role of 'Molly....

Watch 10 of Our Favorite Kristin Chenoweth Performances to Celebrate Her Birthday! It's Kristin Chenoweth's birthday! To celebrate, we're looking back at 10 past performances from her career that are some of our favorites!...

Follow this link:
Go Inside The ACLU's Fight For Civil Rights In The Trump Era This Wednesday - Broadway World

Global Electronic Health Records Software Market 2020 with (Covid-19) Impact Analysis: Growth, Latest Trend Analysis and Forecast 2025 – Owned

The market research report entitled Global Electronic Health Records Software Market 2020 by Company, Type and Application, Forecast to 2025 presents an in-depth analysis of industry- and economy-wide databases for the business management that could offer development and profitability for players in this market. The report scrutinizes a comprehensive evaluation of the global Electronic Health Records Software market that shows critical information pertaining to the current and future growth of the market. The report provides figures out market size, share, trade regulations, product footprint, CAGR, net edge, cost, revenue, and key factors. There is a section dedicated to profiling key companies in the market along with the market shares they hold. The study gives descriptive information after analyzing multiple segments of the market, which includes product types and applications, among others.

Market Dynamics:

The report provides knowledge concerning the latest news, merger, and acquisition of major players, planned or future projects, and policy dynamics. The report throws light on important insights into the global Electronic Health Records Software market dynamics and can modify strategic decision making for the prevailing market players. This section mainly highlights the market drivers, key opportunities, and probable restraints. Information relating to the growing market landscape and growth prospects over succeeding few years is visible in the study. Analysis of the size of the entire available market supported the kind of product, regional constraints, and others form an important part of the global Electronic Health Records Software market report.

DOWNLOAD FREE SAMPLE REPORT: https://www.marketsandresearch.biz/sample-request/74152

NOTE: Our report highlights the major issues and hazards that companies might come across due to the unprecedented outbreak of COVID-19.

Market segment by regions, regional analysis covers: North America (United States, Canada and Mexico), Europe (Germany, France, United Kingdom, Russia and Italy), Asia-Pacific (China, Japan, Korea, India, Southeast Asia and Australia), South America (Brazil, Argentina), Middle East & Africa (Saudi Arabia, UAE, Egypt and South Africa)

Market on the basis of product type: Open Source Software, Non-open Source Software, etc.

Market on the basis of applications: Hospital, Clinical, Other

Top companies are covering this report:- Drchrono, Siemens Healthcare, HealthFusion, ADP AdvancedMD, PracticeFusion, Greenway, GE Healthcare, Kareo, IPatientCare, Epic Systems, Amazing Charts, EMDs, Allscripts Healthcare Solutions, Athenahealth, Sage Software Healthcare, CPSI, Cerner, NextGen Healthcare, MEDITECH, EClinicalWorks, MaineHealth

ACCESS FULL REPORT: https://www.marketsandresearch.biz/report/74152/global-electronic-health-records-software-market-2020-by-company-type-and-application-forecast-to-2025

It Includes Analysis of The Following:

Moreover the report enlightens the current as well as the future challenges of the global Electronic Health Records Software market and helps in creating unique solutions to maximize your growth potential. However, considering appropriate measures and strategic decisions through this report will make businesses flourish aptly and quickly. The report offers information such as production value, strategies adopted by market players and products/services they provide.

Customization of the Report:

This report can be customized to meet the clients requirements. Please connect with our sales team ([emailprotected]), who will ensure that you get a report that suits your needs. You can also get in touch with our executives on +1-201-465-4211 to share your research requirements.

About Us

Marketsandresearch.biz is a leading global Market Research agency providing expert research solutions, trusted by the best. We understand the importance of knowing what global consumers watch and buy, further using the same to document our distinguished research reports. Marketsandresearch.biz has worldwide presence to facilitate real market intelligence using latest methodology, best-in-class research techniques and cost-effective measures for worlds leading research professionals and agencies. We study consumers in more than 100 countries to give you the most complete view of trends and habits worldwide. Marketsandresearch.biz is a leading provider of Full-Service Research, Global Project Management, Market Research Operations and Online Panel Services.

Contact UsMark StoneHead of Business DevelopmentPhone: +1-201-465-4211Email: [emailprotected]Web: http://www.marketsandresearch.biz

Read more:
Global Electronic Health Records Software Market 2020 with (Covid-19) Impact Analysis: Growth, Latest Trend Analysis and Forecast 2025 - Owned

Windows Spotlight Extractor is a tool that lets you view and save the wallpapers downloaded by Spotlight – Ghacks Technology News

The lock screen is one of the best looking elements in Windows 10. And that's thanks to the Windows Spotlight feature that displays a new wallpaper from time to time.

If you've ever wanted to save the image easily, there is a free tool that you can use. It's called Windows Spotlight Extractor.

Run the application and you will see a bunch of thumbnails. The program lists each image that has been saved by Windows Spotlight. Right-click on an image and select "Extract", a pop-up window opens, which you can use to choose the folder where the image should be saved to. You can use the File Menu > Extract option for the same purpose.

The image is saved in the JPG format in the resolution of your computer's screen. If you have a Full HD display, the image is in 1920 x 1080, you get the idea. That's perfect because now you can use the saved picture as your desktop background.

Click on the view menu and enable the "file names" option. Toggling it displays the picture's filename, which is not particularly helpful since Spotlight has random strings for the names.

Of course, there is no way to view the interesting fact about the wallpaper (history of the featured location, fact about an animal/bird, etc) hat Spotlight displays on the lock screen. So unless you recognize the landscape/wildlife in the picture, you may have to do a reverse image search on the web to learn more about it.

The program doesn't try to hide its secret. Click on the File menu in Windows Spotlight Extractor, and select the option that says "Open Cache Folder". The directory is loaded in Windows Explorer, this is where the images that are downloaded by the Spotlight service are saved.

Windows Spotlight Extractor runs the following command to open the folder:

%USERPROFILE%/AppDataLocalPackagesMicrosoft.Windows.ContentDeliveryManager_cw5n1h2txyewyLocalStateAssets

Try it yourself by pasting the above address in the Run command window (Win + R).

Yes, you don't need to the program to get the images. That being said, there are at least 2 options which make Windows Spotlight Extractor quite useful in my opinion.

Take a look at this screenshot. There's just one thumbnail that's being displayed in Explorer. The rest are random files with no extension, aka file type, yet some of these are wallpapers.

I tried opening the folder directly in image viewers, but the pictures weren't displayed in those either. The only way to check if one of these is a wallpaper is by opening each of these manually, or use a viewer like Irfan View to select one image at a time (after clicking on "all files" in the drop-down menu).

That takes time, while Windows Spotlight Extractor displays the preview of all the images in a scrollable manner. The other useful option is basically what the application was designed for, to extract, i.e. save the images. Select and save and you're good to go.

The program is portable, which is another reason for using it.

Windows Spotlight Extractor is an open source software. If you like it, you may like BingSnap which is a similar application that can download the wallpaper of the day from Bing.

Author Rating

no rating based on 0 votes

Software Name

Windows Spotlight Extractor

Operating System

Windows

Software Category

Multimedia

Price

Free

Landing Page

See the original post:
Windows Spotlight Extractor is a tool that lets you view and save the wallpapers downloaded by Spotlight - Ghacks Technology News